Sciweavers

151 search results - page 12 / 31
» Unifying File System Protection
Sort
View
CASES
2006
ACM
14 years 2 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
ICNS
2007
IEEE
14 years 5 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
OSDI
1994
ACM
14 years 6 days ago
Implementation and Performance of Application-Controlled File Caching
Traditional le system implementations do not allow applications to control le caching replacement decisions. We have implemented two-level replacement, a scheme that allows appl...
Pei Cao, Edward W. Felten, Kai Li
ACSAC
2005
IEEE
14 years 4 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
IMF
2007
14 years 10 days ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...