Sciweavers

27 search results - page 2 / 6
» Reflections on UNIX Vulnerabilities
Sort
View
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 5 months ago
Belief Calculus
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang
USS
2010
13 years 3 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
13 years 9 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
ACSW
2004
13 years 6 months ago
Belief-Based Risk Analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang, Daniel Bradley, Svein J. Knap...
HPCA
2009
IEEE
14 years 5 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng