Sciweavers

438 search results - page 16 / 88
» Defending Critical Infrastructure
Sort
View
CSFW
2011
IEEE
14 years 12 days ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
PRDC
2009
IEEE
15 years 7 months ago
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...
128
Voted
NSDI
2007
15 years 2 months ago
Ricochet: Lateral Error Correction for Time-Critical Multicast
Ricochet is a low-latency reliable multicast protocol designed for time-critical clustered applications. It uses IP Multicast to transmit data and recovers from packet loss in end...
Mahesh Balakrishnan, Kenneth P. Birman, Amar Phani...
87
Voted
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 6 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
102
Voted
CD
2005
Springer
15 years 6 months ago
Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA)
Abstract. The ability to deploy Grid infrastructure and services across organizational boundaries (rapidly, reliably, and scalably) is critical for the success of large-scale servi...
Paul Brebner, Wolfgang Emmerich