Sciweavers

1081 search results - page 179 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
ASPLOS
2009
ACM
14 years 9 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
DGO
2007
150views Education» more  DGO 2007»
13 years 10 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
EMSOFT
2005
Springer
14 years 2 months ago
High-level real-time programming in Java
Real-time systems have reached a level of complexity beyond the scaling capability of the low-level or restricted languages traditionally used for real-time programming. While Met...
David F. Bacon, Perry Cheng, David Grove, Michael ...
SIGOPS
2008
146views more  SIGOPS 2008»
13 years 8 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
COMPUTER
2002
196views more  COMPUTER 2002»
13 years 8 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...