Sciweavers

1081 search results - page 37 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
RAID
2010
Springer
13 years 7 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
SAC
2005
ACM
14 years 2 months ago
Towards system software for physical space applications
In ubiquitous computing era, the notion of context-awareness will play an important role. An application should be aware of its operating context for supporting and enriching huma...
Kaori Fujinami, Tatsuo Nakajima
OSDI
1994
ACM
13 years 10 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda
EUROPAR
2010
Springer
13 years 9 months ago
Toward Real-Time, Many-Task Applications on Large Distributed Systems
In the age of Grid, Cloud, volunteer computing, massively parallel applications are deployed over tens or hundreds of thousands of resources over short periods of times to complete...
Sangho Yi, Derrick Kondo, David P. Anderson
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 3 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...