Sciweavers

18094 search results - page 71 / 3619
» The Architecture of Secure Systems
Sort
View
ASPLOS
2010
ACM
15 years 6 months ago
Dynamic filtering: multi-purpose architecture support for language runtime systems
This paper introduces a new abstraction to accelerate the readbarriers and write-barriers used by language runtime systems. We exploit the fact that, dynamically, many barrier exe...
Tim Harris, Sasa Tomic, Adrián Cristal, Osm...
CCS
2006
ACM
15 years 3 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
FPL
2004
Springer
141views Hardware» more  FPL 2004»
15 years 4 months ago
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...
Zachary K. Baker, Viktor K. Prasanna
INFOCOM
2006
IEEE
15 years 5 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez
DAWAK
2009
Springer
14 years 9 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...