Sciweavers

1081 search results - page 149 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
12 years 4 months ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
ICAC
2006
IEEE
14 years 2 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
HICSS
2005
IEEE
122views Biometrics» more  HICSS 2005»
14 years 2 months ago
Enterprise Architecture Integration in E-Government
Achieving goals of better integrated and responsive government services requires moving away from stand alone applications toward more comprehensive, integrated architectures. As ...
Marijn Janssen, Anthony M. Cresswell
AGENTS
1997
Springer
14 years 28 days ago
Progressive Negotiation For Time-Constrained Autonomous Agents
We address in this paper a problem of autonomous agents performing in a common environment where each agent has its goal to achieve before a given deadline. Agents must be able to...
Abdel-Illah Mouaddib
COMSUR
2007
101views more  COMSUR 2007»
13 years 8 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...