Sciweavers

807 search results - page 68 / 162
» Term Rewriting for Access Control
Sort
View
122
Voted
CCS
2008
ACM
15 years 5 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
148
Voted
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 10 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
133
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
154
Voted
JNCA
2011
126views more  JNCA 2011»
14 years 10 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
126
Voted
SOSP
2007
ACM
16 years 16 days ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...