Sciweavers

147 search results - page 22 / 30
» Towards a Component based Privacy Protector Architecture
Sort
View
ACSAC
2000
IEEE
15 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
ICDCS
2008
IEEE
15 years 3 months ago
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living
Advances in networking, sensors, medical devices and smart phones have made it feasible to monitor and provide medical and other assistance to people either in their homes or outs...
Zheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou
SERA
2010
Springer
14 years 7 months ago
Service-Oriented Measurement Infrastructure
The importance of software measurement during the software development process is generally accepted, nowadays. Unfortunately, in practice common software measurement tools find s...
Hashem Yazbek, Reiner R. Dumke, Andreas Schmietend...
ACSAC
2009
IEEE
15 years 1 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
99
Voted
CCECE
2006
IEEE
15 years 3 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu