Sciweavers

15379 search results - page 79 / 3076
» Protecting users from
Sort
View
ICDCS
2003
IEEE
14 years 1 months ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
CN
2006
82views more  CN 2006»
13 years 7 months ago
Cross-sharing vs. self-sharing trees for protecting multicast sessions in mesh networks
In this study, we investigate a cost-effective approach for protecting several multicast sessions from any link failure in an optical network. The approach, referred to as cross-s...
Narendra K. Singhal, Canhui Ou, Biswanath Mukherje...
ALIFE
2004
13 years 7 months ago
Self-Protection and Diversity in Self-Replicating Cellular Automata
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...
Hiroki Sayama
PSD
2010
Springer
167views Database» more  PSD 2010»
13 years 6 months ago
Does Differential Privacy Protect Terry Gross' Privacy?
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential p...
Krishnamurty Muralidhar, Rathindra Sarathy
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
14 years 1 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...