Sciweavers

2782 search results - page 422 / 557
» Issues in holistic system design
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 8 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
HASE
2007
IEEE
15 years 8 months ago
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths
SyncProbe improves the end-to-end predictability of distributed systems by providing applications with a real-time estimate of the maximum expected message delay (upper bound on c...
Jawwad Shamsi, Monica Brockmeyer
ICPADS
2007
IEEE
15 years 8 months ago
Persistence and communication state transfer in an asynchronous pipe mechanism
Abstract— Emergent wide-area distributed systems like computational grids present opportunities for large scientific applications. On these systems, communication mechanisms hav...
Philip Chan, David Abramson
SRDS
2007
IEEE
15 years 8 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu
CCS
2007
ACM
15 years 8 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros