Sciweavers

1081 search results - page 74 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
SIGOPS
2008
120views more  SIGOPS 2008»
13 years 8 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
ACSAC
2005
IEEE
14 years 2 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ICAT
2006
IEEE
14 years 2 months ago
Mobile Information Presentation Schemes for Supra-adaptive Logistics Applications
In supra-adaptive logistics systems, operative workers must be able to quickly and precisely retrieve objects from large storage areas with minimal training. We explore concepts to...
Björn Schwerdtfeger, Troels Frimor, Daniel Pu...
SIGSOFT
2010
ACM
13 years 6 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf