Sciweavers

188 search results - page 23 / 38
» Object-Capability Security in Virtual Environments
Sort
View
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 4 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
AGENTS
1997
Springer
14 years 1 months ago
Go with the Flow: Synthetic Vision for Autonomous Animated Creatures
Real-time obstacle avoidance and low-level navigation is a fundamental problem for autonomous animated creatures. Here we present an ethologically inspired approach to this proble...
Bruce Blumberg
ICAC
2005
IEEE
14 years 2 months ago
AutoPod: Unscheduled System Updates with Zero Data Loss
Patching, upgrading, and maintaining operating system software is a growing management complexity problem that can result in unacceptable system downtime. We introduce AutoPod, a ...
Shaya Potter, Jason Nieh
CCS
2007
ACM
14 years 3 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez