Sciweavers

4 search results - page 1 / 1
» POSIX Access Control Lists on Linux
Sort
View
USENIX
2003
13 years 6 months ago
POSIX Access Control Lists on Linux
This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems. After recapitulating the concepts of these Access Control Lists that ...
Andreas Grünbacher
USENIX
2004
13 years 6 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
IPPS
2009
IEEE
13 years 11 months ago
GenWrapper: A generic wrapper for running legacy applications on desktop grids
Desktop Grids represent an alternative trend in Grid computing using the same software infrastructure as Volunteer Computing projects, such as BOINC. Applications to be deployed o...
Csaba Attila Marosi, Zoltán Balaton, P&eacu...
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 5 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...