Sciweavers

12 search results - page 3 / 3
» Towards Privacy-Aware Handling of Authorizations
Sort
View
ISSTA
2004
ACM
13 years 10 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
SACMAT
2003
ACM
13 years 10 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka