Sciweavers

1081 search results - page 139 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
ETFA
2005
IEEE
14 years 2 months ago
Designing usable decision support systems for HVM
In High Volume Manufacturing (HVM), system control is shared between automation and human workers. The social organisation of workers plays an important role in supporting human d...
Connor Upton, Gavin Doherty
ICWS
2003
IEEE
13 years 10 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
MOBIHOC
2004
ACM
14 years 8 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...
ECOOP
2001
Springer
14 years 1 months ago
Distinctness and Sharing Domains for Static Analysis of Java Programs
Abstract. The application field of static analysis techniques for objectoriented programming is getting broader, ranging from compiler optimizations to security issues. This leads...
Isabelle Pollet, Baudouin Le Charlier, Agostino Co...
WISEC
2010
ACM
14 years 3 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...