Sciweavers

2024 search results - page 51 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
SOSP
2007
ACM
16 years 1 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
WWW
2009
ACM
16 years 5 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
IMC
2009
ACM
15 years 11 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
ISRR
2005
Springer
105views Robotics» more  ISRR 2005»
15 years 10 months ago
Networked Robotic Cameras for Collaborative Observation of Natural Environments
Many viewers simultaneously observe events in a common, but remote, environment in applications ranging from scientific observation, journalism, distance education, security, and...
Dezhen Song, Kenneth Y. Goldberg
SIGOPSE
1998
ACM
15 years 8 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau