Sciweavers

1081 search results - page 3 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 2 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
SOSP
2001
ACM
14 years 4 months ago
Untrusted Hosts and Confidentiality: Secure Program Partitioning
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
FAST
2003
13 years 8 months ago
Plutus: Scalable Secure File Sharing on Untrusted Storage
Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Q...
SOSP
2003
ACM
14 years 4 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...