Sciweavers

228 search results - page 6 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
14 years 1 months ago
Ranking Issues for Information Integration
Ranking of query/search answers, although introduced by early information retrieval systems, has become mandatory for internet searches. When the answers of a query or search are ...
Aditya Telang, Roochi Mishra, Sharma Chakravarthy
HPCA
2008
IEEE
14 years 7 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
ASPLOS
2011
ACM
12 years 11 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
ACSAC
2003
IEEE
14 years 19 days ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 1 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler