Sciweavers

185 search results - page 9 / 37
» File and Memory Security Analysis for Grid Systems
Sort
View
114
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 10 days ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
109
Voted
COMPCON
1994
IEEE
15 years 4 months ago
An Overview of the Spring System
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, t...
James G. Mitchell, Jonathan Gibbons, Graham Hamilt...
GRID
2008
Springer
14 years 12 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
94
Voted
DEXAW
1999
IEEE
91views Database» more  DEXAW 1999»
15 years 4 months ago
Document Analysis Techniques for the Infinite Memory Multifunction Machine
A system that saves a digital copy of every document that users copy, print, or fax, without asking the user, has recently been proposed. Referred to as the Infinite Memory Multif...
Jonathan J. Hull, Dar-Shyang Lee, John F. Cullen, ...
92
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
15 years 9 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...