Sciweavers

CW
2005
IEEE
14 years 5 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
ACSC
2005
IEEE
14 years 5 months ago
A High Performance Kernel-Less Operating System Architecture
Operating Systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is pe...
Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla
SIGMETRICS
2006
ACM
106views Hardware» more  SIGMETRICS 2006»
14 years 5 months ago
Automatic logging of operating system effects to guide application-level architecture simulation
Modern architecture research relies heavily on applicationlevel detailed pipeline simulation. A time consuming part of building a simulator is correctly emulating the operating sy...
Satish Narayanasamy, Cristiano Pereira, Harish Pat...
ASPLOS
2006
ACM
14 years 5 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 5 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ICAC
2006
IEEE
14 years 5 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
EDOC
2006
IEEE
14 years 5 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
EDOC
2006
IEEE
14 years 5 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
EDOC
2006
IEEE
14 years 5 months ago
Scheduling Real-Time Components Using Jitter-Constrained Streams
Abstract— Component-based applications require good middleware support. In particular, business logic should be separated from management code for guaranteeing nonfunctional prop...
Claude-Joachim Hamann, Steffen Zschaler