Sciweavers

12637 search results - page 123 / 2528
» Security for Extensible Systems
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
VRML
1998
ACM
14 years 1 months ago
VSPLUS: A High-Level Multi-User Extension Library for Interactive VRML worlds
In this paper, we introduce the design and implementation of VSPLUS, a high-level multi-user extension library to enable people to simultaneously manipulate interactive VRML world...
Yoshiaki Araki
USENIX
2003
13 years 10 months ago
The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0
We explore the requirements, design, and implementation of the TrustedBSD MAC Framework. The TrustedBSD MAC Framework, integrated into FreeBSD 5.0, provides a flexible framework ...
Robert Watson, Wayne Morrison, Chris Vance, Brian ...
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 9 months ago
The case for active block layer extensions
Self-managing storage systems have recently received attention from the research community due to their promised ability of continuously adapting to best reflect high-level system...
Jorge Guerra, Luis Useche, Medha Bhadkamkar, Ricar...
ACSAC
1999
IEEE
14 years 1 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur