Sciweavers

986 search results - page 32 / 198
» Protecting the Intranet Against
Sort
View
ACSAC
2009
IEEE
14 years 4 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
ICC
2011
IEEE
201views Communications» more  ICC 2011»
12 years 8 months ago
Survivable Optical Grid Dimensioning: Anycast Routing with Server and Network Failure Protection
Abstract—Grids can efficiently deal with challenging computational and data processing tasks which cutting edge science is generating today. So-called e-Science grids cope with ...
Chris Develder, Jens Buysse, Ali Shaikh, Brigitte ...
TIC
2000
Springer
116views System Software» more  TIC 2000»
14 years 20 days ago
Sharing in Typed Module Assembly Language
Abstract. There is a growing need to provide low-overhead softwarebased protection mechanisms to protect against malicious or untrusted code. Type-based approaches such as proof-ca...
Dominic Duggan
BIRTHDAY
2012
Springer
12 years 4 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
DSN
2007
IEEE
14 years 1 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh