Sciweavers

991 search results - page 101 / 199
» Foundations for Designing Secure Architectures
Sort
View
93
Voted
DSN
2002
IEEE
15 years 3 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
AINA
2007
IEEE
15 years 4 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
ANCS
2008
ACM
15 years 7 days ago
Data path credentials for high-performance capabilities-based networks
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any d...
Tilman Wolf
120
Voted
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
14 years 5 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
68
Voted
ACSAC
2007
IEEE
15 years 4 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee