Search results for "execution"

showing 4 items of 74 documents

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Violência, evasão e exclusão na educação superior

2019

The present text focuses on a relationship between higher education, institutional and symbolic violence and exclusion, practicing as a challenge based on reflections on the existence of evasion in Brazilian university. Ignoring the educational institution as a direct responsible for these things, this text considers that a logic in University organization and operation helps to enlarge inequalities that provide the mechanisms of evasion; at the same time, it presents itself as a space of reference and a struggle against social inequalities and violence. On a provisional basis, the text stands out that: depending on the execution of educational procedures and practices undertaken by the ins…

this text is based on theoreticalVeloso Castelo1137-7038 8537 Arxius de sociologia 558787 2019 41 7605681 Violênciaacademic and documentary sources to discuss the subjectEvasão e ExclusãoViolência institucional e simbólicainstitutional and symbolic violence and exclusionthe text stands out that: depending on the execution of educational procedures and practices undertaken by the institution and its representativesdepending on the result of tug of war between antagonistic groups. Set up as an exploratory study and a qualitative approachUyguaciara The present text focuses on a relationship between higher educationUNESCO::SOCIOLOGÍAwith no precise conclusion. Educação Superiorevasão e exclusão na educação superior Da Trindade PrestesIt may become a space of conflict between exclusion and violenceit presents itself as a space of reference and a struggle against social inequalities and violence. On a provisional basisthe university may outgrow and reproduce inequalitiespracticing as a challenge based on reflections on the existence of evasion in Brazilian university. Ignoring the educational institution as a direct responsible for these thingsEdineideat the same timethis text considers that a logic in University organization and operation helps to enlarge inequalities that provide the mechanisms of evasion:SOCIOLOGÍA [UNESCO]Higher EducationJezinedepending on the execution of educational procedures and practices undertaken by the institution and its representatives [the text stands out that]or the balance between those two movementsEmília MariaInstitutional and symbolic violenceEvasion and Exclusio 65 76
researchProduct

Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir

2017

The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…

time-limitseffectiveness of controllegal security[SHS.DROIT] Humanities and Social Sciences/Lawjuge administratifquestion of factjurisdictional reviewrecevabilitéinstructiondélais de jugementinjonctionadministrationremedy for abuse of poweradministrédroits subjectifs[SHS.DROIT]Humanities and Social Sciences/Lawinjunctionsources de légalitéefficacité du contrôlemeans of controladmissibilitydroits objectifs.judgmentcontrôle juridictionnelprocédures d’urgencepouvoir discrétionnaireinvestigationsources of legalityobjective rights.subjective rightsadministrative acttiersdiscretionary powerexecution of judgmentRecours pour excès de pouvoircontrol of opportunityacte administratifurgent proceedingsobjective controladministrative judgemoyens de contrôlejugementexécution de la chosée jugéeadministeredcontrôle objectifquestion de faitsécurité juridiquecontrôle d'opportunité
researchProduct

Preventing reverse engineering of native and managed programs

2015

One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…

virtualisointitrusted computingtietokoneohjelmatthin hypervisorvirtualizationbuffered executionremote attestationsalausavaimetsalauslähdekoodittakaisinmallinnushypervisorithypervisortietoturvainterpretationJava
researchProduct