Security architecture

Results: 5312



#Item
221Software / System software / Computer architecture / Virtual memory / Memory management / Data compression / Data deduplication / Data management / Kernel same-page merging / X86-64 / Covert channel / Kernel

Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

Add to Reading List

Source URL: www.cs.wm.edu

Language: English - Date: 2013-05-30 14:58:15
222Heat transfer / Thermal protection / Transport phenomena / Insulators / Building materials / Energy conservation / Door / Window / Building insulation / Architecture / Construction

Microsoft PowerPoint1e DOS Qualification.ppt

Add to Reading List

Source URL: www.saelzer-security.com

Language: English - Date: 2013-12-04 03:33:05
223Computing / Information technology / Data management / Radio-frequency identification / Database / Data architecture / Computer security / Internet of things / Interoperability / Embedded system / Wireless sensor network / Data warehouse

Challenges of Secure and Reliable Data Management in Heterogeneous Environments Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen Otto-von-Guericke University Magdeburg, Germany {nsiegmun, fe

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English - Date: 2011-03-23 13:27:55
224Software / System software / Computer security / Antivirus software / Content-control software / Webroot / Freeware / Malware / Computer virus / Avira / Webroot Internet Security Complete

WHITE PAPER > LOWERING MSP TCO ENDPOINT SECURITY SOLUTIONS Lowering MSP TCO for Endpoint Security Solutions Bottom-line Benefits of Cloud-based Antivirus Architecture

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:26
225Software / Computer architecture / System software / Linux kernel / Computing platforms / Patch / Xen / Dynamic software updating / Hypervisor / NetBSD / Security-Enhanced Linux / Loadable kernel module

Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
226Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Add to Reading List

Source URL: lyra2.net

Language: English - Date: 2014-01-07 11:26:38
227Security / Computing / Information technology management / Configuration management / Network architecture / Software-defined networking / Routing / Access control / Firewall

Safe and Flexible Controller Upgrades for SDNs Karla Saur Joseph Collard

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2016-02-21 06:07:19
228Computing / Software / Computer architecture / Smartphones / Cloud clients / Computing platforms / Mobile operating systems / Personal computing / Android / Tablet computer / Rooting / Linux

IEEE Symponsium on Security and Privacy, San Jose, CA, MayThe Peril of Fragmentation: Security Hazards in Android Device Driver Customizations Xiaoyong Zhou∗ , Yeonjoon Lee∗ , Nan Zhang∗ , Muhammad Naveed†

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:49
229Software / Computing / Computer architecture / Smartphones / Mobile operating systems / Social networking services / Android / Mobile security / Twitter / Here WeGo / IOS / Mobile deep linking

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources Xiaoyong Zhou1 , Soteris Demetriou2 , Dongjing He2 , Muhammad Naveed2 , Xiaorui Pan1 , XiaoFeng Wang1 , Carl A. Gunter2 , Klara N

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:04
230

The Security Architecture of the Chromium Browser Adam Barth∗ Collin Jackson∗ UC Berkeley

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:06
    UPDATE