Sciweavers

1221 search results - page 150 / 245
» On the Design of Robust Integrators for Fail-Bounded Control...
Sort
View
CSFW
2011
IEEE
12 years 9 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Application partitioning and hierarchical management in grid environments
Several works on grid computing have been proposed in the last years. However, most of them, including available software, can not deal properly with some issues related to contro...
Patrícia Kayser Vargas, Inês de Castr...
SACMAT
2005
ACM
14 years 2 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
IEEESCC
2005
IEEE
14 years 2 months ago
SOA Without Web Services: a Pragmatic Implementation of SOA for Financial Transactions Systems
The Service Oriented Architecture (SOA) provides a methodology for designing software systems by integrating loosely coupled services. Compared to traditional distributed object-o...
Ziyang Duan, Subhra Bose, Charles A. Shoniregun, P...
CCS
2007
ACM
14 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...