Sciweavers

2726 search results - page 434 / 546
» Application security support in the operating system kernel
Sort
View
USENIX
2001
15 years 5 months ago
User-Level Checkpointing for LinuxThreads Programs
Multiple threads running in a single, shared address space is a simple model for writing parallel programs for symmetric multiprocessor (SMP) machines and for overlapping I/O and ...
William R. Dieter, James E. Lumpp Jr.
SAC
2008
ACM
15 years 4 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...
CF
2008
ACM
15 years 6 months ago
DMA-based prefetching for i/o-intensive workloads on the cell architecture
Recent advent of the asymmetric multi-core processors such as Cell Broadband Engine (Cell/BE) has popularized the use of heterogeneous architectures. A growing body of research is...
M. Mustafa Rafique, Ali Raza Butt, Dimitrios S. Ni...
WWW
2009
ACM
16 years 5 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
TISSEC
2010
237views more  TISSEC 2010»
14 years 11 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...