Sciweavers

8503 search results - page 326 / 1701
» Secure Software Architectures
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
IPPS
2007
IEEE
15 years 11 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
146
Voted
PLDI
2011
ACM
14 years 8 months ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
ICDCSW
2005
IEEE
15 years 10 months ago
An Intermediary Software Infrastructure for Edge Services
We describe the goals and architecture of a new framework that aims at facilitating the deployment of adaptation services running on intermediate edge servers. The main goal is to...
Raffaella Grieco, Delfina Malandrino, Vittorio Sca...
171
Voted
DAC
1996
ACM
15 years 9 months ago
A System Design Methodology for Software/Hardware Co-Development of Telecommunication Network Applications
In this paper, we describe a system design methodology for the concurrent development of hybrid software/hardware systems for telecom network applications. This methodology is bas...
Bill Lin