Sciweavers

28 search results - page 5 / 6
» Service Differentiation of Communication-bound Processes in ...
Sort
View
INFSOF
2006
129views more  INFSOF 2006»
13 years 5 months ago
An interactive service customization model
: Mass customization has become one of the key strategies for a service provider to differentiate itself from its competitors in a highly segmented global service market. This pape...
Jian Cao, Jie Wang, Kincho H. Law, Shen-sheng Zhan...
ACSAC
1999
IEEE
13 years 9 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ACSAC
2002
IEEE
13 years 10 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ACSAC
2001
IEEE
13 years 9 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
RTAS
2002
IEEE
13 years 10 months ago
Achieving End-to-end Predictability in the TAO Real-time CORBA ORB
End-to-end predictability of operations is essential for many fixed-priority distributed real-time and embedded (DRE) applications, such as command and control systems, manufactu...
Irfan Pyarali, Douglas C. Schmidt, Ron Cytron