Learn More
You may not copy this material or any parts of it without the express written permission of the author. We are not liable for anything you do with this book or use this book for, including but not limited to choking people with its pages, using the book to trip folks, the kid leaving it on the steps, the pollution it creates when you burn it, or any side(More)
Simplicial and ∆-structures of configuration spaces are investigated. New connections between the homotopy groups of the 2-sphere and the braid groups are given. The higher homotopy groups of the 2-sphere are shown to be derived groups of the braid groups over the 2-sphere. Moreover the higher homotopy groups of the 2-sphere are shown to be isomorphic to(More)
In this paper, we model complexity-based virus detection mechanisms which detect modifications and thereby prevent computer viruses from causing secondary infections. We use these models to show how to protect information in both trusted and untrusted computing bases, show the optimality of these mechanisms, and discuss some of their features. The models(More)
Is virtualization the solution to computing security? A brief look at the history of computer security salvation might provide some insight. A basic concept underlying OS protection is separation. The OS provides separation of files, directories, processes, users, and devices from each other, even though the hardware lets them interact arbitrarily. In the(More)