Sciweavers

194 search results - page 2 / 39
» I-RMI: Performance Isolation in Information Flow Application...
Sort
View
ESORICS
2011
Springer
12 years 4 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
ACSAC
1998
IEEE
13 years 9 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ICIP
2009
IEEE
14 years 5 months ago
Estimation And Analysis Of Urban Traffic Flow
This paper describes methods for extracting traffic flow information from urban traffic scenes. The ultimate goal is to collect a macroscopic view of traffic flow information in a...
CIDR
2007
106views Algorithms» more  CIDR 2007»
13 years 6 months ago
Isolation Support for Service-based Applications: A Position Paper
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
ASPLOS
2009
ACM
14 years 5 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...