Sciweavers

518 search results - page 19 / 104
» Abstract Interpretation-Based Protection
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Abstract— In label-switched networks such as MPLS, protection routing involves computing and setting up the backup paths at the same time when the primary paths are routed. It ha...
Faisal Aslam, Saqib Raza, Zartash Afzal Uzmi, Youn...
PET
2004
Springer
15 years 7 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
ICISS
2010
Springer
14 years 12 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
INFOCOM
2003
IEEE
15 years 7 months ago
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter
Abstract— This paper studies the problem of designing survivable optical wavelength division multiplexed (WDM) networks. A wavelength-routed wide area backbone network supporting...
Sunil Gowda, Krishna M. Sivalingam
DSS
2007
226views more  DSS 2007»
15 years 1 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri