Sciweavers

6199 search results - page 17 / 1240
» Monitoring the
Sort
View
JCS
2010
122views more  JCS 2010»
13 years 6 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
RV
2010
Springer
157views Hardware» more  RV 2010»
13 years 6 months ago
Copilot: A Hard Real-Time Runtime Monitor
Abstract. We address the problem of runtime monitoring for hard realtime programs—a domain in which correctness is critical yet has largely been overlooked in the runtime monitor...
Lee Pike, Alwyn Goodloe, Robin Morisset, Sebastian...
DAC
2007
ACM
14 years 8 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
ACSAC
2006
IEEE
14 years 1 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
ICDCS
2009
IEEE
14 years 4 months ago
REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems
To observe, analyze and control large scale distributed systems and the applications hosted on them, there is an increasing need to continuously monitor performance attributes of ...
Shicong Meng, Srinivas R. Kashyap, Chitra Venkatra...