Sciweavers

12637 search results - page 105 / 2528
» Security for Extensible Systems
Sort
View
HOTOS
2009
IEEE
14 years 27 days ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
ACSAC
1999
IEEE
14 years 1 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
PERCOM
2006
ACM
14 years 8 months ago
A Reusable, Extensible Infrastructure for Augmented Field Trips
This paper describes a reusable pervasive information infrastructure developed as part of the Equator IRC, designed to allow the construction of literacy based eLearning activitie...
Mark J. Weal, Don Cruickshank, Danius T. Michaelid...
ESORICS
2000
Springer
14 years 19 days ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
OOPSLA
2001
Springer
14 years 1 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès