Sciweavers

580 search results - page 73 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
ICISC
2007
99views Cryptology» more  ICISC 2007»
15 years 3 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
SAC
2000
ACM
15 years 6 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
VRCAI
2009
ACM
15 years 8 months ago
Collision-free travel with terrain maps
Terrain maps, commonly used for updating elevation values of a moving object (i.e., a traveler), may be conveniently used for detecting and preventing collisions between the trave...
Andrei Sherstyuk, Anton Treskunov
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 8 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
COMPSAC
2007
IEEE
15 years 8 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...