Sciweavers

36 search results - page 7 / 8
» acsac 2002
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint
In February 2002, more than 50 leaders in the information assurance field warned the President of the United States of a national strategic vulnerability in the country’s inform...
O. Sami Saydjari
ACSAC
2002
IEEE
13 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ACSAC
2002
IEEE
13 years 10 months ago
Security Architecture of the Austrian Citizen Card Concept
When admitting electronic media as a means for citizens to approach public authorities – i.e., when advancing official proceedings towards e-Government – security is an indisp...
Herbert Leitold, Arno Hollosi, Reinhard Posch
ACSAC
2002
IEEE
13 years 10 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
ACSAC
2002
IEEE
13 years 10 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson