Sciweavers

74 search results - page 9 / 15
» New Security Architectures Based on Emerging Disk Functional...
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 2 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
IWAN
2000
Springer
13 years 11 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
ICWS
2003
IEEE
13 years 9 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
CCS
2007
ACM
13 years 11 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
SAC
2006
ACM
14 years 1 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...