Sciweavers

1353 search results - page 78 / 271
» Securing Current and Future Process Control Systems
Sort
View
WORM
2004
15 years 4 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
ACSAC
2007
IEEE
15 years 9 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
93
Voted
CPE
1997
Springer
66views Hardware» more  CPE 1997»
15 years 7 months ago
Performance Prediction: An Industry Perspective
Predicting the performance of a system before it is built is a highly desirable goal, but one that is rarely achieved. This paper examines performance problems and issues within in...
Peter Hutton, Brian Hill
SIGOPSE
1998
ACM
15 years 7 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
NSPW
2006
ACM
15 years 9 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...