Sciweavers

2335 search results - page 345 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
115
Voted
IPPS
2005
IEEE
15 years 7 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
259
Voted
PE
2011
Springer
365views Optimization» more  PE 2011»
14 years 8 months ago
Optimal resource allocation for time-reservation systems
This paper studies the optimal resource allocation in time-reservation systems. Customers arrive at a service facility and receive service in two steps; in the first step informa...
Ran Yang, Sandjai Bhulai, Rob van der Mei, Frank J...
142
Voted
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
127
Voted
WMCSA
2003
IEEE
15 years 7 months ago
River: An Infrastructure for Context Dependent, Reactive Communication Primitives
Applications and services in ubiquitous computing systems often interact in a context-dependent, reactive manner. How information flows, and what services communicate when, is det...
Jong Hee Kang, Matthai Philipose, Gaetano Borriell...
146
Voted
DFN
2003
15 years 3 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König