|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 65 occurrences of 59 keywords
|
|
|
Results
Found 59 publication records. Showing 59 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
142 | Jaroslaw Paduch, Jamie Levy, Bilal Khan |
Using a secure permutational covert channel to detect local and wide area interposition attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 79-83, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP, interposition, protocols, covert channels, DNS |
86 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 156-167, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
81 | Marc González 0001, Albert Serra, Xavier Martorell, José Oliver 0002, Eduard Ayguadé, Jesús Labarta, Nacho Navarro |
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), Cancun, Mexico, May 1-5, 2000, pp. 235-240, 2000, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
73 | Ennio Grasso |
Implementing interposition in CORBA Object Transaction Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 24-26 October 1997, Gold Coast, Australia, Proceedings, pp. 184-189, 1997, IEEE Computer Society, 0-8186-8031-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
CORBA object model, Object Transaction Service, implementation design, Orbix, transaction objects interposition, object-oriented methods, distributed transactions, object request broker |
64 | Carlo Bellettini, Julian L. Rrushi |
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 285-300, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
64 | John Reumann, Kang G. Shin |
Stateful distributed interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 22(1), pp. 1-48, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
component services, distributed context, multitiered services, Distributed computing, operating systems, server consolidation |
64 | Claude Duchesne, Jean-Yves Hervé |
A Point-Based Approach to the Interposition Problem in Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 1261-1265, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
61 | Christof Fetzer, Martin Süßkraut |
Switchblade: enforcing dynamic personalized system call models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 273-286, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
system call interposition, system call models, security, taint analysis |
52 | Stephanie Balzer, Thomas R. Gross |
Modular reasoning about invariants over shared state with interposed data members. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLPV ![In: Proceedings of the 4th ACM Workshop Programming Languages meets Program Verification, PLPV 2010, Madrid, Spain, January 19, 2010, pp. 49-56, 2010, ACM, 978-1-60558-890-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ownership type systems, invariants |
52 | Philip W. L. Fong, Simon A. Orr |
A Module System for Isolating Untrusted Software Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 203-212, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Kevin Scott, Jack W. Davidson |
Safe Virtual Execution Using Software Dynamic Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 209-218, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Baomin Xu, Weimin Lian, Qiang Gao |
Migration of enterprise JavaBeans with ProActive Interposition Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 38(8), pp. 22-28, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Component, Migration, Active Object, EJB |
46 | Andrea Baldini, Alfredo Benso, Silvia Chiusano, Paolo Prinetto |
'BOND': An Interposition Agents Based Fault Injector for Windows NT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 25-27 October 2000, Yamanashi, Japan, Proceedings, pp. 387-395, 2000, IEEE Computer Society, 0-7695-0719-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Michael B. Jones |
Interposition Agents: Transparently Interposing User Code at the System Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the Fourteenth ACM Symposium on Operating System Principles, SOSP 1993, The Grove Park Inn and Country Club, Asheville, North Carolina, USA, December 5-8, 1993, pp. 80-93, 1993, ACM, 0-89791-632-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
44 | Nupur Kothari, Kiran Nagaraja, Vijay Raghunathan, Florin Sultan, Srimat T. Chakradhar |
HERMES: A Software Architecture for Visibility and Control in Wireless Sensor Network Deployments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 395-406, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interposition, sensor networks, control, software reliability, visibility, SOS |
44 | Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, Robert Tappan Morris |
Information flow control for standard OS abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 321-334, 2007, ACM, 978-1-59593-591-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DIFC, decentralized information flow control, endpoints, system call interposition, web services, reference monitor |
34 | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini |
A Live Digital Forensic system for Windows networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 653-667, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan |
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 223-234, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Enol Fernández, Elisa Heymann, Miquel A. Senar |
Resource Management for Interactive Jobs in a Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: Proceedings of the 2006 IEEE International Conference on Cluster Computing, September 25-28, 2006, Barcelona, Spain, 2006, IEEE Computer Society, 1-4244-0328-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Fareed Zaffar, Gershon Kedem, Ashish Gehani |
Paranoid: A Global Secure File Access Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 322-332, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Alfredo Benso, Silvia Chiusano, Paolo Prinetto |
A COTS Wrapping Toolkit for Fault Tolerant Applications under Windows NT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTW ![In: 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 3-5 July 2000, Palma de Mallorca, Spain, pp. 9-16, 2000, IEEE Computer Society, 0-7695-0646-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Steven Wei Der Chien, Kento Sato, Artur Podobas, Niclas Jansson, Stefano Markidis, Michio Honda |
Accelerating Scientific Application through Transparent I/O Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.14576, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Hugo Sadok, Zhipeng Zhao, Valerie Choung, Nirav Atre, Daniel S. Berger, James C. Hoe, Aurojit Panda, Justine Sherry |
We need kernel interposition over the network dataplane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotOS ![In: HotOS '21: Workshop on Hot Topics in Operating Systems, Ann Arbor, Michigan, USA, June, 1-3, 2021., pp. 152-158, 2021, ACM, 978-1-4503-8438-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Gionata Fragomeni, Michele Rossi |
Peripheral extracorporeal membrane oxygenation with interposition graft. The outflow is highly dependent on the anastomotic angle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBM ![In: 2019 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2019, San Diego, CA, USA, November 18-21, 2019, pp. 2296-2299, 2019, IEEE, 978-1-7281-1867-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | T. Stephen Strickland, Sam Tobin-Hochstadt, Robert Bruce Findler, Matthew Flatt |
Chaperones and impersonators: run-time support for reasonable interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2012, part of SPLASH 2012, Tucson, AZ, USA, October 21-25, 2012, pp. 943-962, 2012, ACM, 978-1-4503-1561-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Philip J. Guo, Dawson R. Engler |
CDE: Using System Call Interposition to Automatically Create Portable Software Packages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference ![In: 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
29 | Bo Li 0005, Jianxin Li 0002, Tianyu Wo, Chunming Hu, Liang Zhong |
A VMM-Based System Call Interposition Framework for Program Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010, Shanghai, China, December 8-10, 2010, pp. 706-711, 2010, IEEE Computer Society, 978-0-7695-4307-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu 0010 |
A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, 12-15 October 2009, Macau (S.A.R.), China, pp. 831-835, 2009, IEEE Computer Society, 978-1-4244-5113-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Matús Harvan, Alexander Pretschner |
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 373-380, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement |
29 | Se-Won Kim, Jae-Hyun Hwang, Jin-Hee Choi, Chuck Yoo |
Sentry: A Binary-Level Interposition Mechanism for Trusted Kernel Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 169, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Claude Duchesne, Jean-Yves Hervé |
A Regularized Technique for Real-time Interposition of 3D Objects in Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005, pp. 1402-1408, 2005, IEEE, 0-7803-9298-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Tal Garfinkel, Ben Pfaff, Mendel Rosenblum |
Ostia: A Delegating Architecture for Secure System Call Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, San Diego, California, USA, 2004, The Internet Society, 1-891562-18-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
29 | Tal Garfinkel |
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA, 2003, The Internet Society, 1-891562-16-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
29 | Douglas Thain, Miron Livny |
Multiple Bypass: Interposition Agents for Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 4(1), pp. 39-47, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | K. Jain, R. Sekar 0001 |
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA, 2000, The Internet Society, 1-891562-07-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
29 | Claude Duchesne, Jean-Yves Hervé |
Comparison of matching criteria for the interposition problem in augmented reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: `Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions`, Sheraton Music City Hotel, Nashville, Tennessee, USA, 8-11 October 2000, pp. 1013-1018, 2000, IEEE, 0-7803-6583-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Michael B. Jones |
Interposition Agents: Transparently Interposing User Code at the System Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Internet Programming ![In: Secure Internet Programming, Security Issues for Mobile and Distributed Objects, pp. 339-368, 1999, Springer, 3-540-66130-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Timothy W. Curry |
Profiling and Tracing Dynamic Library Usage Via Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Summer ![In: USENIX Summer 1994 Technical Conference, Boston, Massachusetts, USA, June 6-10, 1994, Conference Proceeding, pp. 267-278, 1994, USENIX Association, 1-880446-62-6. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
27 | Elizabeth Stinson, John C. Mitchell |
Characterizing Bots' Remote Control Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 45-64, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
host-based, behavior-based, taint, interposition, detection, system call |
27 | Richard W. Vuduc, Martin Schulz 0001, Daniel J. Quinlan, Bronis R. de Supinski, Andreas Sæbjørnsen |
Improving distributed memory applications testing by message perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADTAD ![In: Proceedings of the 4th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2006), PADTAD 2006, Portland, Maine, USA, July 17, 2006, pp. 27-36, 2006, ACM, 1-59593-414-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MPI profiling, interposition layer |
17 | Enrico Lovat, Alexander Pretschner |
Data-centric multi-layer usage control enforcement: a social network example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 151-152, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Oren Laadan, Jason Nieh |
Operating system virtualization: practice and experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYSTOR ![In: Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, Haifa, Israel, May 24-26, 2010, 2010, ACM, 978-1-60558-908-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
operating systems, virtualization |
17 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing expressive runtime security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 18(3), pp. 9:1-9:43, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
policy-specification language, policy enforcement, Policy composition |
17 | Phil McGachey, Antony L. Hosking, J. Eliot B. Moss |
Classifying Java class transformations for pervasive virtualized access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPCE ![In: Generative Programming and Component Engineering, 8th International Conference, GPCE 2009, Denver, Colorado, USA, October 4-5, 2009, Proceedings, pp. 75-84, 2009, ACM, 978-1-60558-494-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
java, program transformation, object model |
17 | Jian-Wei Ye, Binxing Fang, Jinqiao Shi, Zhi-Gang Wu |
Protecting Mobile Codes Using the Decentralized Label Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 493-500, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Martin C. Rinard |
Living in the comfort zone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21-25, 2007, Montreal, Quebec, Canada, pp. 611-622, 2007, ACM, 978-1-59593-786-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
acceptability properties, comfort zone, monitoring, repair, rectification |
17 | Stephanie Balzer, Thomas R. Gross, Patrick Eugster |
A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30 - August 3, 2007, Proceedings, pp. 323-346, 2007, Springer, 978-3-540-73588-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 111-120, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
17 | Oleg Kiselyov, Chung-chieh Shan |
Delimited Continuations in Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, 6th International and Interdisciplinary Conference, CONTEXT 2007, Roskilde, Denmark, August 20-24, 2007, Proceedings, pp. 291-302, 2007, Springer, 978-3-540-74254-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 131-143, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
17 | Gabriel Parmer, Richard West |
Hijack: Taking Control of COTS Systems for Real-Time User-Level Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real-Time and Embedded Technology and Applications Symposium ![In: Proceedings of the 13th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2007, April 3-6, 2007, Bellevue, Washington, USA, pp. 133-146, 2007, IEEE Computer Society, 978-0-7695-2800-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie 0001 |
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 17-31, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrew Whitaker, Richard S. Cox, Marianne Shaw, Steven D. Gribble |
Rethinking the Design of Virtual Machine Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(5), pp. 57-62, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
virtual machines, computer architectures, software systems, virtualization technology |
17 | Douglas Thain |
Identity Boxing: A New Technique for Consistent Global Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2005 Conference on High Performance Networking and Computing, November 12-18, 2005, Seattle, WA, USA, CD-Rom, pp. 51, 2005, IEEE Computer Society, 1-59593-061-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Consistency analysis of authorization hook placement in the Linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 175-205, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, access control models |
17 | Jenny Dankelman |
Surgical robots and other training tools in minimally invasive surgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (3) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 2459-2464, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini |
A Host Intrusion Prevention System for Windows Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 352-368, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 |
Runtime verification of authorization hook placement for the linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 225-234, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Jan J. Koenderink, Andrea J. van Doorn, Kristin J. Dana, Shree K. Nayar |
Bidirectional Reflection Distribution Function of Thoroughly Pitted Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 31(2-3), pp. 129-144, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Bidrectional Reflection Distribution Function, surface scattering, texture, photometry, physical properties |
Displaying result #1 - #59 of 59 (100 per page; Change: )
|
|