Sciweavers

2335 search results - page 20 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
PERVASIVE
2006
Springer
15 years 1 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
HOTOS
1999
IEEE
15 years 5 months ago
The Case for Informed Transport Protocols
Wide-area distributed applications are frequently limited by the performance of Internet data transfer. We argue that the principle cause of this effect is the poor interaction be...
Stefan Savage, Neal Cardwell, Thomas E. Anderson
IJSYSC
2006
92views more  IJSYSC 2006»
15 years 1 months ago
Adaptive control of distributed collector solar fields
: Distributed collector solar fields are spatially distributed engineering systems which aim at collecting and storing energy from solar radiation. They are formed by mirrors which...
J. M. Lemos
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 7 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
IEEEARES
2009
IEEE
15 years 8 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...