نتایج جستجو برای: sandbox model

تعداد نتایج: 2104952  

2013
Mathias Payer Boris Bluntschli Thomas R. Gross

Security patches protect an application from discovered vulnerabilities and should be applied as fast as possible. On the other hand, patching the application reduces the availability of the service due to the necessary restart. System administrators need to balance system availability with a potential compromise of system integrity. A dynamic software update mechanism applies security updates ...

2017
Christopher Partridge Sergio de Cesare Andrew Mitchell Frederik Gailly Mesbah Khan

One of the central concerns of the multi-level modelling (MLM) community is the hierarchy of classifications that appear in conceptual models; what these are, how they are linked and how they should be organised into levels and modelled. Though there has been significant work done in this area, we believe that it could be enhanced by introducing a systematic way to investigate the ontological n...

1997
Li Gong Marianne Mueller Hemma Prafullchandra Roland Schemers

This paper describes the new security architecture that has been implemented as part of JDK1.2, the forthcoming Java Development Kit. In going beyond the sandbox security model in the original release of Java, JDK1.2 provides ne-grained access control via an easily con gurable security policy. Moreover, JDK1.2 introduces the concept of protection domain and a few related security primitives tha...

2002
David S. Peterson Matt Bishop Raju Pandey

A widely used technique for securing computer systems is to execute programs inside protection domains that enforce established security policies. These containers, often referred to as sandboxes, come in a variety of forms. Although current sandboxing techniques have individual strengths, they also have limitations that reduce the scope of their applicability. In this paper, we give a detailed...

Journal: :Science Translational Medicine 2014

2001
Xavier Leroy

Web applets have popularized the idea of downloading and exe uting untrusted ompiled ode on the personal omputer running the Web browser, without user's approval or intervention. Obviously, this raises major se urity issues: without appropriate se urity measures, a mali ious applet ould mount a variety of atta ks against the lo al omputer, su h as destroying data (e.g. reformatting the disk), m...

Journal: :Journal of Structural Geology 2021

In this study we introduce and utilize GEOSPH, a Lagrangian particle-based continuum Smoothed Particle Hydrodynamics (SPH) code to simulate the deformation of geologic materials in sandbox-style experiments using an elastoplastic constitutive model. Due meshfree nature SPH, our proposed framework is capable handling large deformations characteristic experiments. SPH also able capture strain loc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید