Sciweavers

158 search results - page 1 / 32
» Fortification of IT Security by Automatic Security Advisory ...
Sort
View
AAAI
1996
13 years 5 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
IFIP
2009
Springer
13 years 2 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ACSAC
2006
IEEE
13 years 10 months ago
Address-Space Randomization for Windows Systems
Address-space randomization (ASR) is a promising solution to defend against memory corruption attacks that have contributed to about three-quarters of USCERT advisories in the pas...
Lixin Li, James E. Just, R. Sekar
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Protocols for data-hiding based text document security and automatic processing
Text documents, in electronic and hardcopy forms, are and will probably remain the most widely used kind of content in our digital age. The goal of this paper is to overview proto...
Frédéric Deguillaume, Yuriy Rytsar, ...