Memory resource management in VMware ESX server

CA Waldspurger - ACM SIGOPS Operating Systems Review, 2002 - dl.acm.org
VMware ESX Server is a thin software layer designed to multiplex hardware resources
efficiently among virtual machines running unmodified commodity operating systems. This …

FARSITE: Federated, available, and reliable storage for an incompletely trusted environment

A Adya, WJ Bolosky, M Castro, G Cermak… - ACM SIGOPS …, 2002 - dl.acm.org
Farsite is a secure, scalable file system that logically functions as a centralized file server but
is physically distributed among a set of untrusted computers. Farsite provides file availability …

[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle

C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …

[PDF][PDF] Efficient, transparent, and comprehensive runtime code manipulation

D Bruening, S Amarasinghe - 2004 - burningcutlery.com
This thesis addresses the challenges of building a software system for general-purpose
runtime code manipulation. Modern applications, with dynamically-loaded modules and …

Understanding data lifetime via whole system simulation

J Chow, B Pfaff, T Garfinkel, K Christopher… - USENIX Security …, 2004 - usenix.org
Strictly limiting the lifetime (ie propagation and duration of exposure) of sensitive data (eg
passwords) is an important and well accepted practice in secure software development …

Fast detection of scanning worm infections

SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning
worms, as when left unchecked such worms have been able to infect the majority of …

[PDF][PDF] Automatic Misconfiguration Troubleshooting with PeerPressure.

HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang - OSDI, 2004 - usenix.org
Technical support contributes 17% of the total cost of ownership of today's desktop PCs [25].
An important element of technical support is troubleshooting misconfigured applications …

[图书][B] The inlined reference monitor approach to security policy enforcement

U Erlingsson - 2004 - search.proquest.com
Embedding security enforcement code into applications is an alternative to traditional
security mechanisms. This dissertation supports the thesis that such Inlined Reference …

Bringing virtualization to the x86 architecture with the original vmware workstation

E Bugnion, S Devine, M Rosenblum… - ACM Transactions on …, 2012 - dl.acm.org
This article describes the historical context, technical challenges, and main implementation
techniques used by VMware Workstation to bring virtualization to the x86 architecture in …

[PDF][PDF] Access Control Based on Execution History.

M Abadi, C Fournet - NDSS, 2003 - cs.columbia.edu
Security is a major, frequent concern in extensible software systems such as Java Virtual
Machines and the Common Language Runtime. These systems aim to enable simple …