Sciweavers

12637 search results - page 105 / 2528
» Security for Extensible Systems
Sort
View
HOTOS
2009
IEEE
15 years 6 months ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
ACSAC
1999
IEEE
15 years 7 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
100
Voted
PERCOM
2006
ACM
16 years 2 months ago
A Reusable, Extensible Infrastructure for Augmented Field Trips
This paper describes a reusable pervasive information infrastructure developed as part of the Equator IRC, designed to allow the construction of literacy based eLearning activitie...
Mark J. Weal, Don Cruickshank, Danius T. Michaelid...
124
Voted
ESORICS
2000
Springer
15 years 6 months ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
120
Voted
OOPSLA
2001
Springer
15 years 7 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès