A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guest editor's preface
2003
Journal of Computer Security
They formulate the security properties required of such protocols, and identify different ways in which properties in the twoparty setting might extend to the multi-party situation. ...
The objective of the workshop is to bring together researchers interested in the foundations of computer security to discuss and explore issues in access-control, cryptographic protocols, database security ...
In "A unifying approach to the security of distributed and multi-threaded programs", Mantel and Sabelfeld are concerned with the problem of establishing secure information flow in the context of multi-threaded ...
doi:10.3233/jcs-2003-11401
fatcat:dh2horqk6ffmjlktuelkl5rjqy
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix)
[article]
2017
arXiv
pre-print
We also present an N-version execution engine to seamlessly synchronize these variants so that all distributed security checks work together to guarantee the security of a target program. ...
A number of security mechanisms have been proposed to harden programs written in unsafe languages, each of which mitigates a specific type of memory error. ...
If the primitive may cause the thread to sleep study – combining ASan, MSan, and UBSan – to show
(such as a mutex), the thread wakes up its next sibling in that B UNSHIN is capable of unifying ...
arXiv:1705.09165v2
fatcat:xcefkb7px5d3hf3fwmjn6s3deu
Task & Resource Self-adaptive Embedded Real-time Operating System Microkernel for Wireless Sensor Nodes
[article]
2014
arXiv
pre-print
In addition, this kernel implements a run-time over-the-air updating mechanism and provides a security policy to avoid the attacks and ensure the reliable operation of nodes. ...
This paper presents a task and resource self-adaptive embedded real-time microkernel, which proposes hybrid programming model and offers a two-level scheduling strategy to support real-time multi-task ...
The kernel provides a security policy for sensor nodes, in order to guarantee the normal operation of the nodes and support reliable and efficient code distribution. ...
arXiv:1403.5010v1
fatcat:tisus5lh7jdujfh5j4vkifypxq
Practical Fine-grained Privilege Separation in Multithreaded Applications
[article]
2013
arXiv
pre-print
It remains challenging to retrofit the classic multithreaded programming model so that the security and privilege separation in multi-principal applications can be resolved. ...
An inherent security limitation with the classic multithreaded programming model is that all the threads share the same address space and, therefore, are implicitly assumed to be mutually trusted. ...
Conclusion Arbiter is a run-time system and a set of security primitives which can realize fine-grained and data-centric privilege separation for multi-principal multithreaded applications. ...
arXiv:1305.2553v1
fatcat:aqerh3nbe5dqhkdmnqavxml4zu
Towards logic programming based coordination in virtual worlds
[chapter]
1998
Lecture Notes in Computer Science
We propose a unified framework for coordination in multi-user Virtual Worlds, based on our experience with LogiMOO, a BinProlog+Linda based programmable shared Virtual World. ...
Our experiments with agent coding in LogiMOO and Java and interaction with external visual and logic components, show the practicality of our constructs for real life programming. ...
Special thanks go to Daniel Perron for long discussions helping to come out with the initial idea of Logi-MOO and to Stephen Rochefort for his comments on the design and his help on implementing LogiMOO's ...
doi:10.1007/bfb0027099
fatcat:ohcoxtr2affnflyljgsugncfci
The Secure Machine: Efficient Secure Execution On Untrusted Platforms
[article]
2018
arXiv
pre-print
SeM supports existing binaries of single- and multi-threaded applications running on single- or multi-core, multi-CPU. ...
SeM provides confidentiality and integrity for a secure program without trusting the platform software or any off-chip hardware. ...
Secure Process and Thread Migration Migration is the core of distributed multi-threading. ...
arXiv:1803.03951v1
fatcat:judqg442wvekdbevambchu3o6i
Scala Actors: Unifying thread-based and event-based programming
2009
Theoretical Computer Science
In Section 3 we present an extension to our programming model that allows us to unify thread-based and event-based models of concurrency under a single abstraction of actors. ...
In this paper we show how thread-based and event-based programming can be unified under a single actor abstraction. ...
In the process, we review event-and thread-based solutions to common problems, such as blocking I/O operations. Our goal is then to discuss potential benefits of our unified approach. ...
doi:10.1016/j.tcs.2008.09.019
fatcat:spi72d6j2ja77bz54jxjqxbaoe
Software Development for Parallel and Multi-Core Processing
[chapter]
2012
Embedded Systems - High Performance Systems, Applications and Projects
Also, with multiple cores on a single chip the data latencies of distributed programming are mostly negated. ...
The directives extend the sequential C/C++ programming languages with
parallel constructs. 22
Parallel Unified C, also known as Unified Parallel C, is an extension of the C
programming language designed ...
For wide-ranging embedded systems to continue their growth, a number of high-quality fundamental and applied researches are indispensable. ...
doi:10.5772/38261
fatcat:3zwgizqp3vgqfa2hn6gyxmuw44
On the Fly Porn Video Blocking Using Distributed Multi-Gpu and Data Mining Approach
2014
International Journal of Distributed and Parallel systems
The video is processed on parallel and distributed platform in shortest time and decision about filtering the video is taken in real time. Track record of blocked content and websites is cached, too. ...
In this paper, we propose a model where user is allowed to start watching any video; at the backend porn detection process using extracted video and image features shall run on distributed nodes with multiple ...
The focus of our work is to do adult content detection and prepare a model for implementing that on distributed multi GPU System. ...
doi:10.5121/ijdps.2014.5401
fatcat:x6v6q3o5sfchjd2ld37cr4juhi
High Throughput Parallelization of AES-CTR Algorithm
2013
IEICE transactions on information and systems
Data encryption and decryption are common operations in network-based application programs that must offer security. ...
In this paper, we propose a new parallelization approach to improve the throughput performance for the de-facto standard data encryption and decryption algorithm, AES-CTR (Counter mode of AES). ...
In the new approach, the cost for distributing blocks to each core and the number of procedure calls for the encryption and the synchronizations at the end decreases by a factor of E compared with the ...
doi:10.1587/transinf.e96.d.1685
fatcat:f4wtxwec6vaqljtrybq4zya7cm
Effective Utilization of Multicore Processor for Unified Threat Management Functions
2012
Journal of Computer Science
Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor based systems. ...
Results: Execution time for some of the UTM functions implemented was analyzed to arrive at an effective allocation and parallelization methodology that is dependent on the hardware and the workload. ...
ACKNOWLEDGMENTS The researchers acknowledge TIFAC-CORE in Network Engineering (established under the Mission REACH program of Department of Science and Technology, Govt. of India) for providing necessary ...
doi:10.3844/jcssp.2012.68.75
fatcat:rwkd7y2gmfcshc5j42sr3lxqfq
GLoP
2014
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14
The constant increase of link speeds, threats and users, produce large volumes of log data and become increasingly difficult to analyse on a Central Processing Unit (CPU). ...
The results show throughput of 20Gbps and demonstrate that modern GPUs can be utilised to increase the operational speed of large scale log processing scenarios, saving precious time before and after an ...
Acknowledgment The authors would like to thank Agilent Technologies for their insightful comments and feedback as well as their support. ...
doi:10.1145/2659651.2659700
dblp:conf/sin/BellekensTARK14
fatcat:dctzmfj4ujerzjddykobfagsle
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed
2017
Symmetry
The main contribution of this work is to propose and implement a new version of the ClamAV antivirus using parallel processing with OpenMP, easily portable to a variety of hardware platforms and operating ...
All the tests used the same dataset constituted of 1.33 GB of data distributed among 2766 files of different sizes. ...
Related Work This section reviews previous research on frameworks for multi-core programming and approaches to speed up ClamAV.
Multi-Core CPU Programming The work of Shen et al. ...
doi:10.3390/sym9090172
fatcat:ib4oobx46jgyrcz5ihyprryy6a
Flexible Linear Algebra Development and Scheduling with Cholesky Factorization
2015
2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
In this work we are using a lightweight runtime environment to handle many of the complexities in such distributed, heterogeneous systems. ...
On the other hand, a Xeon Phi coprocessor will work most effectively with degree of parallelism between GPUs and multicore-CPUs. ...
Acknowledgements This material is based upon work supported by the National Science Foundation under Grants ACI-1339822 and 1137097, the Department of Energy, and the NVIDIA and Intel Corporations. ...
doi:10.1109/hpcc-css-icess.2015.285
dblp:conf/hpcc/HaidarYCLTD15
fatcat:x66ibo3q75gbbfgjf6k43yrynq
Architectural Support for Network Applications on Simultaneous MultiThreading Processors
2007
2007 IEEE International Parallel and Distributed Processing Symposium
The goal of this paper is to evaluate the applicability and efficiency of Simultaneous Multi-Threaded (SMT) as a network processor. ...
Finally, a new architectural solution to cope with packet dependency is proposed and evaluated. ...
Figure 4 shows a comparison of L2 unified cache miss rates between the execution of one-thread and the execution of three-threads. ...
doi:10.1109/ipdps.2007.370236
dblp:conf/ipps/YiG07
fatcat:4vropjc5w5bt3gcczn7c5dbqkm
« Previous
Showing results 1 — 15 out of 14,198 results