Sciweavers

2747 search results - page 199 / 550
» Network externalities in software systems
Sort
View
DIMVA
2011
14 years 7 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
106
Voted
JDCTA
2010
95views more  JDCTA 2010»
14 years 10 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
164
Voted
CBSE
2011
Springer
14 years 3 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
NSDI
2007
15 years 5 months ago
X-Trace: A Pervasive Network Tracing Framework
Modern Internet systems often combine different applications (e.g., DNS, web, and database), span different administrative domains, and function in the context of network mechanis...
Rodrigo Fonseca, George Porter, Randy H. Katz, Sco...
DSN
2007
IEEE
15 years 9 months ago
Assurance Based Development of Critical Systems
  Assurance Based Development (ABD) is the synergistic construction of a critical computing system and an  assurance  case  that  sets  out  the  dependabilit...
Patrick J. Graydon, John C. Knight, Elisabeth A. S...