Sciweavers

320 search results - page 46 / 64
» Security architecture for component-based operating systems
Sort
View
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 7 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
SACMAT
2003
ACM
14 years 22 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ICSE
1999
IEEE-ACM
13 years 11 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
ISARCS
2010
164views Hardware» more  ISARCS 2010»
13 years 9 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
FPL
2003
Springer
164views Hardware» more  FPL 2003»
14 years 21 days ago
Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System
Intrusion Detection Systems such as Snort scan incoming packets for evidence of security threats. The most computation-intensive part of these systems is a text search against hund...
Ioannis Sourdis, Dionisios N. Pnevmatikatos