Sciweavers

1081 search results - page 136 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
MOBILITY
2009
ACM
14 years 3 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
CCS
2009
ACM
14 years 9 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
RTSS
2003
IEEE
14 years 2 months ago
Dynamic Integrated Scheduling of Hard Real-Time, Soft Real-Time and Non-Real-Time Processes
Real-time systems are growing in complexity and realtime and soft real-time applications are becoming common in general-purpose computing environments. Thus, there is a growing ne...
Scott A. Brandt, Scott A. Banachowski, Caixue Lin,...
NOMS
2010
IEEE
172views Communications» more  NOMS 2010»
13 years 7 months ago
ROCS: a remotely provisioned OSGi framework for ambient systems
—One of the challenges of ambient systems lies in providing all the available services of the environment to the ambient devices, even if they do not physically host those servic...
Stéphane Frénot, Noha Ibrahim, Fr&ea...
SOSP
2003
ACM
14 years 5 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...