Sciweavers

1299 search results - page 58 / 260
» On the Correctness of Operating System Kernels
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 10 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
USENIX
2000
15 years 5 months ago
FiST: A Language for Stackable File Systems
Traditional file system development is difficult. Stackable file systems promise to ease the development of file systems by offering a mechanism for incremental development. Unfor...
Erez Zadok, Jason Nieh
ATAL
2009
Springer
15 years 10 months ago
Operational semantics of goal models in adaptive agents
Several agent-oriented software engineering methodologies address the emerging challenges posed by the increasing need of adaptive software. A common denominator of such methodolo...
Mirko Morandini, Loris Penserini, Anna Perini
163
Voted
XMLSEC
2003
ACM
15 years 9 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
HOTOS
1999
IEEE
15 years 8 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...