Sciweavers

449 search results - page 4 / 90
» Protecting the Hosted Application Server
Sort
View
NSDI
2008
13 years 10 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
WWW
2009
ACM
14 years 8 months ago
Efficient application placement in a dynamic hosting platform
Web hosting providers are increasingly looking into dynamic hosting to reduce costs and improve the performance of their platforms. Instead of provisioning fixed resources to each...
Zakaria Al-Qudah, Hussein A. Alzoubi, Mark Allman,...
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ICDCS
2005
IEEE
14 years 1 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
HPDC
2003
IEEE
14 years 1 months ago
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms
The Grid is realizing the vision of providing computation as utility: computation jobs can be scheduled on-demand in Grid hosts based on available computation capacity. In this pa...
Xuxian Jiang, Dongyan Xu