Sciweavers

2517 search results - page 148 / 504
» Secure Deployment of Components
Sort
View
159
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
110
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Refactoring: to the rubicon... and beyond!
We demonstrate a new approach to refactoring which involves the decomposition of familiar high-level refactorings such as Extract method into their components. By understanding al...
Roly Perera
127
Voted
IFIP11
2004
114views Business» more  IFIP11 2004»
15 years 5 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
150
Voted
SIGOPS
2008
120views more  SIGOPS 2008»
15 years 3 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
148
Voted
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
15 years 12 days ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum