Sciweavers

245 search results - page 17 / 49
» Code Generation for Streaming: An Access Execute Mechanism
Sort
View
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 4 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
96
Voted
CCS
2006
ACM
15 years 4 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
USITS
2001
15 years 1 months ago
Measurement and Analysis of a Streaming Media Workload
The increasing availability of continuous-media data is provoking a significant change in Internet workloads. For example, video from news, sports, and entertainment sites, and au...
Maureen Chesire, Alec Wolman, Geoffrey M. Voelker,...
79
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
125
Voted
TII
2010
124views Education» more  TII 2010»
14 years 7 months ago
Address-Independent Estimation of the Worst-case Memory Performance
Abstract--Real-time systems are subject to temporal constraints and require a schedulability analysis to ensure that task execution finishes within lower and upper specified bounds...
Basilio B. Fraguela, Diego Andrade, Ramon Doallo