Sciweavers

1410 search results - page 141 / 282
» An operational approach to the design of workflow systems
Sort
View
USENIX
2004
15 years 3 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
130
Voted
PERCOM
2008
ACM
15 years 8 months ago
Distributed Video Adaptation and Streaming for Heterogeneous Devices
In this paper, we present a new concept of distributed adaptation and P2P streaming supporting the expansion of context-aware mobile P2P systems. Here, we propose to adapt video c...
Razib Iqbal, Dewan Tanvir Ahmed, Shervin Shirmoham...
ECRTS
2005
IEEE
15 years 7 months ago
Scheduling Tasks with Markov-Chain Based Constraints
Markov-Chain (MC) based constraints have been shown to be an effective QoS measure for a class of real-time systems, particularly those arising from control applications. Scheduli...
Donglin Liu, Xiaobo Sharon Hu, Michael D. Lemmon, ...
USS
2008
15 years 4 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ITNG
2008
IEEE
15 years 8 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson