Sciweavers

288 search results - page 20 / 58
» Virtual Machines, Managed Code and Component Technology
Sort
View
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 6 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
SISW
2005
IEEE
15 years 5 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
ENTCS
2007
116views more  ENTCS 2007»
14 years 11 months ago
DisCComp - A Formal Model for Distributed Concurrent Components
Most large-scaled software systems are structured in distributed components to manage complexity and have to cope with concurrent executed threads. System decomposition and concur...
Andreas Rausch
IFIP12
2009
14 years 9 months ago
Semantic Annotation, Publication and Discovery of Java Software Components: an Integrated Approach
: Component-based software development has matured into standard practice in software engineering. Among the advantages of reusing software modules are lower costs, faster developm...
Zinon Zygkostiotis, Dimitris Dranidis, Dimitrios K...
EUROSYS
2008
ACM
15 years 8 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...