Sciweavers

19 search results - page 1 / 4
» sp 1996
Sort
View
SP
1996
IEEE
13 years 8 months ago
Java Security: From HotJava to Netscape and Beyond
Drew Dean, Edward W. Felten, Dan S. Wallach
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
13 years 8 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
13 years 8 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
13 years 8 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...