Sciweavers

441 search results - page 39 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 9 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
DSN
2005
IEEE
15 years 5 months ago
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications
While inherent resource redundancies in distributed applications facilitate gracefully degradable services, methods to enhance their dependability may have subtle, yet significan...
Ann T. Tai, Kam S. Tso, William H. Sanders, Savio ...
PERCOM
2005
ACM
15 years 11 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
ICDCSW
2005
IEEE
15 years 5 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 4 months ago
Growth and Propagation of Disturbances in a Communication Network Model
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...