Sciweavers

228 search results - page 29 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 21 days ago
A UML-Driven Enterprise Architecture Case Study
The U.S. Capitol Police (USCP) are responsible for protecting the Capitol Hill complex encompassing the Senate and House office buildings and the Capitol building. Currently, the ...
Frank Armour, Stephen H. Kaisler, Jim Getter, Doug...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
TRUST
2010
Springer
14 years 14 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
SOSP
2007
ACM
14 years 4 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
DAGSTUHL
1993
13 years 8 months ago
Supporting continuous media applications in a micro-kernel environment
Currently, popular operating systems are unable to support the end-toend real-time requirements of distributed continuous media. Furthermore, the integration of continuous media c...
Geoff Coulson, Gordon S. Blair, Philippe Robin, Do...