Sciweavers

1081 search results - page 168 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
14 years 3 months ago
Increased accuracy through noise injection in abstract RTOS simulation
RTOS Simulation Henning Zabel, Wolfgang Mueller Universität Paderborn, C-LAB Fürstenallee 11, D-33102 Paderborn, Germany —Today, mobile and embedded real-time systems have to c...
Henning Zabel, Wolfgang Mueller
ICAC
2008
IEEE
14 years 3 months ago
CARVE: A Cognitive Agent for Resource Value Estimation
Recently, industry has begun investigating and moving towards utility computing, where computational resources (processing, memory and I/O) are availably on demand at a market cos...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
POLICY
2005
Springer
14 years 2 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
FMCO
2005
Springer
156views Formal Methods» more  FMCO 2005»
14 years 2 months ago
On a Probabilistic Chemical Abstract Machine and the Expressiveness of Linda Languages
babilistic Chemical Abstract Machine and the Expressiveness of Linda Languages Alessandra Di Pierro1 , Chris Hankin2 , and Herbert Wiklicky2 1 Dipartimento di Informatica, Universi...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
USENIX
2008
13 years 11 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig