Sciweavers

228 search results - page 13 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
124
Voted
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 9 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
99
Voted
NDSS
1999
IEEE
15 years 7 months ago
PGRIP: PNNI Global Routing Infrastructure Protection
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
108
Voted
ACSAC
2010
IEEE
15 years 24 days ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
114
Voted
SRDS
2006
IEEE
15 years 8 months ago
Consistent Replication of Multithreaded Distributed Objects
Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but h...
Hans P. Reiser, Jörg Domaschka, Franz J. Hauc...
120
Voted
RAID
2010
Springer
15 years 1 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh