Sciweavers

92 search results - page 2 / 19
» Secure virtual architecture: a safe execution environment fo...
Sort
View
ASPLOS
2008
ACM
13 years 7 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
SC
2004
ACM
13 years 10 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
ISCA
2003
IEEE
169views Hardware» more  ISCA 2003»
13 years 10 months ago
Virtual Simple Architecture (VISA): Exceeding the Complexity Limit in Safe Real-Time Systems
Meeting deadlines is a key requirement in safe realtime systems. Worst-case execution times (WCET) of tasks are needed for safe planning. Contemporary worst-case timing analysis t...
Aravindh Anantaraman, Kiran Seth, Kaustubh Patil, ...
DATE
2008
IEEE
199views Hardware» more  DATE 2008»
13 years 11 months ago
Safe Automatic Flight Back and Landing of Aircraft Flight Reconfiguration Function (FRF)
SOFIA (Safe Automatic Flight Back and Landing of Aircraft) project is a response to the challenge of developing concepts and techniques enabling the safe and automatic return to g...
Juan Alberto Herreria Garcia
USS
2008
13 years 7 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel