Sciweavers

2024 search results - page 23 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 1 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
PAISI
2007
Springer
15 years 8 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
PERVASIVE
2008
Springer
15 years 1 months ago
Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition
Networked devices for the storage and rendering of digital media are rapidly becoming ubiquitous in homes throughout the industrialized world. Existing approaches to home media con...
Mark W. Newman, Ame Elliott, Trevor F. Smith
EUROSYS
2008
ACM
15 years 11 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
GLOBECOM
2007
IEEE
15 years 8 months ago
Provider Provisioned Overlay Networks and Their Utility in DoS Defense
—The current overlay deployment model supports minimal or no involvement by ISPs in overlay deployment and operation. This model rules out a richer set of interactions between th...
Jinu Kurian, Kamil Saraç