Sciweavers

1081 search results - page 35 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
PLDI
2005
ACM
14 years 2 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 7 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
EUROSYS
2007
ACM
14 years 5 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
MOBILWARE
2010
ACM
13 years 6 months ago
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms
We propose a new elastic application model that enables the seamless and transparent use of cloud resources to augment the capability of resourceconstrained mobile devices. The sal...
Xinwen Zhang, Sangoh Jeong, Anugeetha Kunjithapath...
MIDDLEWARE
2004
Springer
14 years 2 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...