Sciweavers

2429 search results - page 208 / 486
» Using Aspects to Design a Secure System
Sort
View
146
Voted
HPCC
2007
Springer
15 years 9 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
123
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
118
Voted
SIGIR
2003
ACM
15 years 8 months ago
Stuff I've seen: a system for personal information retrieval and re-use
Most information retrieval technologies are designed to facilitate information discovery. However, much knowledge work involves finding and re-using previously seen information. W...
Susan T. Dumais, Edward Cutrell, Jonathan J. Cadiz...
POPL
2006
ACM
16 years 3 months ago
Why dependent types matter
We exhibit the rationale behind the design of Epigram, a dependently typed programming language and interactive program development system, using refinements of a well known progr...
James McKinna
NOSSDAV
2009
Springer
15 years 8 months ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....