Sciweavers

12637 search results - page 100 / 2528
» Security for Extensible Systems
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
CSFW
2000
IEEE
14 years 1 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
ACSAC
2006
IEEE
14 years 3 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...
JCIT
2008
103views more  JCIT 2008»
13 years 9 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
CDC
2008
IEEE
130views Control Systems» more  CDC 2008»
14 years 3 months ago
Extension and application of a novel hardware-in-the-loop simulator design methodology
— This paper builds on previous work on optimal methodologies for the design of numerical subsystems for non-linear, uncertain hardware-in-the-loop (HWIL) simulators. Firstly, th...
Monte Stuart MacDiarmid, Marko Bacic, Ronald Danie...