Application-level isolation and recovery with solitude

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Application-level Isolation and Recovery Abstract a Framework for Application-level Isolation and Recovery

A Framework for Application-Level Isolation and Recovery Shvetank Jain Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2008 When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage because the state changes made by an attacker and those made by regular users can be closely intertw...

متن کامل

Application-Level Isolation to Cope with Malicious Database Users

System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. The capacity of these techniques, however, is limited: innocent users may be mistaken for malicious ones while malicious users stay at large. Isolation is a method that has been applied to protec...

متن کامل

Application-Level Isolation Using Data Inconsistency Detection

Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of the data items needs to be protected from damage due to the criticality level or integrity requirements of the data items. In such a case, complete isolation of a suspicious user can consume more resources than necessar...

متن کامل

Preference for Solitude, Social Isolation, Suicidal Ideation, and Self-Harm in Adolescents.

PURPOSE Social isolation is associated with suicidal ideation (SI) and self-harm (SH) among adolescents. However, the association between preference for solitude (PfS), SI, and SH is unknown. The prevalence of adolescents who have both of PfS and social isolation and the risks for SI and SH among them are also unknown. METHODS Information on PfS, social isolation, SI, and SH was collected in ...

متن کامل

Application - Transparent Process - Level Error Recovery for Multicomputers

A multicomputer system consisting of hundreds of processors interconnected by point-to-point links can achieve high performance for many important applications. We propose a new application-transparent, process-level, distributed error recovery scheme for multicomputers. Checkpointing is initiated by timers at intervals determined by the needs of the application. Checkpointing and recovery invo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGOPS Operating Systems Review

سال: 2008

ISSN: 0163-5980

DOI: 10.1145/1357010.1352603