Sciweavers

8493 search results - page 51 / 1699
» Implementing a distributed firewall
Sort
View
LCTRTS
2001
Springer
15 years 4 months ago
Designing an Efficient and Scalable Server-side Asynchrony Model for CORBA
When the Asynchronous Method Invocation (AMI) model was introduced into the CORBA specification, client applications benefited from the ability to invoke nonblocking two-way reque...
Darrell Brunsch, Carlos O'Ryan, Douglas C. Schmidt
SP
1990
IEEE
15 years 3 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 3 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
SIS
2008
15 years 1 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
USS
2010
14 years 9 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich