Sciweavers

2335 search results - page 158 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
DISCEX
2003
IEEE
15 years 10 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
DSOM
2000
Springer
15 years 9 months ago
Middleware Platform Management Based on Portable Interceptors
Abstract. Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although ...
Olaf Kath, Aart van Halteren, Frank Stoinski, Maar...
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 6 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
FAST
2009
15 years 2 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
IEEEPACT
2006
IEEE
15 years 11 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...