Sciweavers

804 search results - page 159 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ASPLOS
2006
ACM
13 years 8 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
ECRTS
2010
IEEE
13 years 7 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
GRID
2006
Springer
13 years 6 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
IJDE
2006
95views more  IJDE 2006»
13 years 6 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
13 years 6 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power