Sciweavers

45 search results - page 3 / 9
» MarketNet: Using Virtual Currency to Protect Information Sys...
Sort
View
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 6 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
IPSN
2007
Springer
14 years 5 days ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
ASPLOS
2010
ACM
14 years 27 days ago
Virtualized and flexible ECC for main memory
We present a general scheme for virtualizing main memory errorcorrection mechanisms, which map redundant information needed to correct errors into the memory namespace itself. We ...
Doe Hyun Yoon, Mattan Erez
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
13 years 11 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
13 years 12 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie