Sciweavers

18094 search results - page 78 / 3619
» The Architecture of Secure Systems
Sort
View
ANCS
2005
ACM
15 years 5 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
ACSAC
2000
IEEE
15 years 3 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
15 years 3 months ago
A Secure and Reliable Bootstrap Architecture
William A. Arbaugh, David J. Farber, Jonathan M. S...
NETGAMES
2006
ACM
15 years 5 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 5 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King