Sciweavers

1081 search results - page 33 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
IWMM
2004
Springer
92views Hardware» more  IWMM 2004»
14 years 2 months ago
Memory accounting without partitions
Operating systems account for memory consumption and allow for termination at the level of individual processes. As a result, if one process consumes too much memory, it can be te...
Adam Wick, Matthew Flatt
ACSAC
2002
IEEE
14 years 1 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
IJBC
2008
95views more  IJBC 2008»
13 years 8 months ago
Time Scaling of Chaotic Systems: Application to Secure Communications
The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preservi...
Donatello Materassi, Michele Basso
HOTOS
1997
IEEE
14 years 27 days ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad