Sciweavers

865 search results - page 82 / 173
» A Secure Information Flow Architecture for Web Services
Sort
View
SACMAT
2006
ACM
15 years 5 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
95
Voted
CASES
2004
ACM
15 years 5 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 29 days ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
CONCURRENCY
2002
122views more  CONCURRENCY 2002»
14 years 11 months ago
The Grid Portal Development Kit
Computational science portals are emerging as useful and necessary interfaces for performing operations on the Grid. The Grid Portal Development Kit (GPDK) facilitates the develop...
Jason Novotny
WWW
2004
ACM
16 years 17 days ago
Automating Design Support in Supply Chains on Semantic Web Services
The integration of four design attributes (componentcost, quality, function, and technology) streamlines product design by providing a multilateral view to designers that leads to...
Incheon Paik, Hiroyuki Akimoto, Shinjirou Takami