Sciweavers

696 search results - page 3 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
MAGS
2007
82views more  MAGS 2007»
13 years 5 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...
MOBISEC
2009
Springer
14 years 9 days ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
IPPS
2006
IEEE
13 years 11 months ago
Executing MPI programs on virtual machines in an Internet sharing system
Internet sharing systems aim at federating and utilizing distributed computing resources across the Internet. This paper presents a user-level virtual machine (VM) approach to MPI...
Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongy...
ACSAC
2005
IEEE
13 years 11 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ISORC
2005
IEEE
13 years 11 months ago
RMMC Programming Model and Support Execution Engine in the TMO Programming Scheme
: While the conventional remote method invocation mechanism has been considered for a long time as the primary approach for facilitating interactions among real-time objects, a mul...
K. H. (Kane) Kim, Yuqing Li, Sheng Liu, Moon-hae K...