Sciweavers

2335 search results - page 84 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
DSN
2007
IEEE
15 years 8 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICDCS
2008
IEEE
15 years 11 months ago
Updates and Asynchronous Communication in Trusted Computing Systems
Software-based usage controls typically are vulnerable to attacks. Trusted Platform Modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM...
José Carlos Brustoloni, David Kyle
TACS
1994
Springer
15 years 8 months ago
Separate Abstract Interpretation for Control-Flow Analysis
Abstract Interpretation for Control-Flow Analysis Yan Mei Tang and Pierre Jouvelot CRI, Ecole des Mines de Paris, France Effect systems and abstract interpretation are two methods ...
Yan Mei Tang, Pierre Jouvelot
CIKM
2010
Springer
15 years 2 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolving distributed agents for managing air traffic
Air traffic management offers an intriguing real world challenge to designing large scale distributed systems using evolutionary computation. The ability to evolve effective air t...
Adrian K. Agogino, Kagan Tumer