Sciweavers

1663 search results - page 1 / 333
» Computer Security in the Real World
Sort
View
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 4 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
FTDCS
1999
IEEE
13 years 9 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
COMPUTER
2010
103views more  COMPUTER 2010»
13 years 4 months ago
Interview: Software Security in the Real World
Ann E. Kelley Sobel, Gary McGraw
NDSS
1999
IEEE
13 years 9 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
NDSS
2000
IEEE
13 years 9 months ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...