Sciweavers

12637 search results - page 18 / 2528
» Security for Extensible Systems
Sort
View
CCS
2007
ACM
13 years 11 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 25 days ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
JSSPP
2005
Springer
14 years 1 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
SOSP
2005
ACM
14 years 4 months ago
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...
SOSP
2007
ACM
14 years 4 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...