Sciweavers

577 search results - page 12 / 116
» Engineering Sufficiently Secure Computing
Sort
View
DEM
2001
Springer
198views GIS» more  DEM 2001»
15 years 1 months ago
Modeling of Ecosystems as a Data Source for Real-Time Terrain Rendering
With the advances in rendering hardware, it is possible to render very complex scenes in real-time. In general, computers do not have enough memory to store all the necessary infor...
Johan Hammes
ICSE
1995
IEEE-ACM
15 years 1 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
69
Voted
POLICY
2004
Springer
15 years 2 months ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
COMPLEX
2009
Springer
15 years 4 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
JPDC
2006
83views more  JPDC 2006»
14 years 9 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit