Sciweavers

1402 search results - page 154 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 10 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
142
Voted
AH
2008
Springer
15 years 10 months ago
RSS-Based Interoperability for User Adaptive Systems
This paper presents an approach to exploit widely used tag annotations to address two important issues in user-adaptive systems: the cold-start problem and the integration of distr...
Yiwen Wang, Federica Cena, Francesca Carmagnola, O...
123
Voted
EDBTW
2010
Springer
15 years 10 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
HPCA
2000
IEEE
15 years 8 months ago
Impact of Chip-Level Integration on Performance of OLTP Workloads
With increasing chip densities, future microprocessor designs have the opportunity to integrate many of the traditional systemlevel modules onto the same chip as the processor. So...
Luiz André Barroso, Kourosh Gharachorloo, A...
DAC
2007
ACM
16 years 5 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...