: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...