Sciweavers

331 search results - page 36 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
CCS
2008
ACM
14 years 11 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
ICCS
2003
Springer
15 years 2 months ago
Application Controlled IPC Synchrony - An Event Driven Multithreaded Approach
Interprocess communication (IPC) is an important phenomenon in distributed computing and operating systems. Microkernels of modern operating systems use synchronous IPC semantics f...
Susmit Bagchi, Mads Nygaard
SOSP
2005
ACM
15 years 6 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
DRM
2005
Springer
15 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
RTSS
2008
IEEE
15 years 4 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West