Sciweavers

802 search results - page 88 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
EUROSYS
2008
ACM
14 years 7 months ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
GCC
2006
Springer
14 years 1 months ago
UGE4B: An Universal Grid Environment for Bioinformatics Research
Recent years, grid technology has been used widely in the fields of scientific research. In this paper, we present an universal grid environment for Bioinformatics Research (UGE4B...
Gang Chen, Yongwei Wu, Weimin Zheng
AWCC
2004
Springer
14 years 3 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
COLCOM
2009
IEEE
14 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...