Sciweavers

785 search results - page 137 / 157
» A Calculus for Trust Management
Sort
View
DISCEX
2003
IEEE
15 years 7 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
101
Voted
TLDI
2003
ACM
102views Formal Methods» more  TLDI 2003»
15 years 7 months ago
A typed interface for garbage collection
An important consideration for certified code systems is the interaction of the untrusted program with the runtime system, most notably the garbage collector. Most certified cod...
Joseph Vanderwaart, Karl Crary
105
Voted
EUROSYS
2010
ACM
15 years 7 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
DANCE
2002
IEEE
15 years 6 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
137
Voted
CIKM
2001
Springer
15 years 6 months ago
Selecting Relevant Instances for Efficient and Accurate Collaborative Filtering
Collaborative filtering uses a database about consumers’ preferences to make personal product recommendations and is achieving widespread success in both E-Commerce and Informat...
Kai Yu, Xiaowei Xu, Martin Ester, Hans-Peter Krieg...