Sciweavers

4445 search results - page 774 / 889
» Reflective Authorization Systems
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
15 years 4 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
ICDCS
2007
IEEE
15 years 4 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
EDUTAINMENT
2007
Springer
15 years 4 months ago
A Hybrid of Plot-Based and Character-Based Interactive Storytelling
Interactive storytelling in the virtual environment attracts a lot of research interests in recent years. Story plot and character are two most important elements of a story. Based...
Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen
ICN
2007
Springer
15 years 4 months ago
Toward Broad-Spectrum Autonomic Management
— The fields of autonomics and system configuration share a common goal in decreasing the cost of ownership of large fabrics. In this paper we present a combined vision in whic...
Edmund Smith, Paul Anderson