Sciweavers

2043 search results - page 347 / 409
» Reasoning About Security Models
Sort
View
OOPSLA
2004
Springer
14 years 3 months ago
Practical predicate dispatch
Predicate dispatch is an object-oriented (OO) language mechanism for determining the method implementation to be invoked upon a message send. With predicate dispatch, each method ...
Todd D. Millstein
SYSTOR
2010
ACM
14 years 2 months ago
On the DMA mapping problem in direct device assignment
I/O intensive workloads running in virtual machines can suffer massive performance degradation. Direct assignment of I/O devices to virtual machines is the best performing I/O vir...
Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
14 years 2 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
POPL
1998
ACM
14 years 2 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
14 years 1 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...