Sciweavers

986 search results - page 45 / 198
» Protecting the Intranet Against
Sort
View
FOAL
2009
ACM
14 years 3 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland
DATE
2007
IEEE
106views Hardware» more  DATE 2007»
14 years 3 months ago
Low-cost protection for SER upsets and silicon defects
Extreme transistor scaling trends in silicon technology are soon to reach a point where manufactured systems will suffer from limited device reliability and severely reduced life...
Mojtaba Mehrara, Mona Attariyan, Smitha Shyam, Kyp...
IPPS
2006
IEEE
14 years 3 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 2 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
14 years 1 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...