Sciweavers

228 search results - page 14 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
COMGEO
2010
ACM
13 years 4 months ago
A new paradigm for integrated environmental monitoring
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Kevin Montgomery, Carsten W. Mundt
ISMIR
2001
Springer
208views Music» more  ISMIR 2001»
13 years 11 months ago
The JRing System for Computer-Assisted Musicological Analysis
Among other factors, high complexity and mandatory expert computer knowledge make many music IR and music analysis systems unsuitable for the majority of largely computer-illitera...
Andreas Kornstädt
ACSAC
2002
IEEE
14 years 10 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
CCS
2001
ACM
13 years 12 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
ESORICS
2006
Springer
13 years 11 months ago
Policy-Driven Memory Protection for Reconfigurable Hardware
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ry...