Sciweavers

DFG
2004
Springer
13 years 11 months ago
Introduction to Subject Area 'Charts'
Werner Damm, Bernd Westphal
SIGOPSE
2004
ACM
13 years 11 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
USENIX
2004
13 years 7 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
OSDI
2004
ACM
14 years 6 months ago
Configuration Debugging as Search: Finding the Needle in the Haystack
This work addresses the problem of diagnosing configuration errors that cause a system to function incorrectly. For example, a change to the local firewall policy could cause a ne...
Andrew Whitaker, Richard S. Cox, Steven D. Gribble
OSDI
2004
ACM
14 years 6 months ago
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code
Copy-pasted code is very common in large software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Recent studies show that copy-paste...
Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
Operating System
Top of PageReset Settings