Sciweavers

11 search results - page 2 / 3
» sec 2000
Sort
View
SEC
2000
13 years 6 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...
SEC
2000
13 years 6 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
SEC
2004
13 years 6 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
SOSP
1997
ACM
13 years 6 months ago
Free Transactions With Rio Vista
Abstract: Transactions and recoverable memories are powerful mechanisms for handling failures and manipulating persistent data. Unfortunately, standard recoverable memories incur a...
David E. Lowell, Peter M. Chen
ICRA
2000
IEEE
136views Robotics» more  ICRA 2000»
13 years 9 months ago
Recent Progress in Local and Global Traversability for Planetary Rovers
Autonomous planetary rovers operating in vast unknown environments must operate efficiently because of size, power and computing limitations. Recently, we have developed a rover c...
Sanjiv Singh, Reid G. Simmons, Trey Smith, Anthony...