Sciweavers

1448 search results - page 6 / 290
» Restricted Stack Implementations
Sort
View
SP
2000
IEEE
15 years 1 months ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ICC
2007
IEEE
15 years 3 months ago
A Non-beaconing ZigBee Network Implementation and Performance Study
— In this paper we present our implementation of a layered ZigBee network and the performance test results using non-beaconing networks. Adding the implemented network layer to a...
Magnus Armholt, Sakari Junnila, Irek Defée
PODC
2006
ACM
15 years 3 months ago
Common2 extended to stacks and unbounded concurrency
Common2, the family of objects that implement and are wait-free implementable from 2 consensus objects, is extended inhere in two ways: First, the stack object is added to the fam...
Yehuda Afek, Eli Gafni, Adam Morrison
80
Voted
TNC
2004
120views Education» more  TNC 2004»
14 years 10 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer