Sciweavers

948 search results - page 74 / 190
» Analysis of SITA policies
Sort
View
ICDE
2005
IEEE
131views Database» more  ICDE 2005»
16 years 3 months ago
Improving Preemptive Prioritization via Statistical Characterization of OLTP Locking
OLTP and transactional workloads are increasingly common in computer systems, ranging from ecommerce to warehousing to inventory management. It is valuable to provide priority sch...
David T. McWherter, Bianca Schroeder, Anastassia A...
ESSOS
2010
Springer
15 years 10 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
ITICSE
2009
ACM
15 years 8 months ago
Software reuse and plagiarism: a code of practice
In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a signiï¬...
J. Paul Gibson
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 8 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
ACSAC
2007
IEEE
15 years 8 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel