Sciweavers

IEEEARES
2008
IEEE
13 years 11 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller
IEEEARES
2008
IEEE
13 years 11 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
IEEEARES
2008
IEEE
13 years 11 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
IEEEARES
2008
IEEE
13 years 11 months ago
Symmetric Active/Active Replication for Dependent Services
Christian Engelmann, Stephen L. Scott, Chokchai Le...
IEEEARES
2008
IEEE
13 years 11 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
IEEEARES
2008
IEEE
13 years 11 months ago
Modelling Security Properties in a Grid-based Operating System with Anti-Goals
In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
IEEEARES
2008
IEEE
13 years 11 months ago
Finding Evidence of Antedating in Digital Investigations
— Finding evidence of antedating is an important goal in many digital investigations. This paper explores how causality can expose antedating by investigating storage systems for...
Svein Yngvar Willassen
IEEEARES
2008
IEEE
13 years 11 months ago
Design of an FDB based Intra-domain Packet Traceback System
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadob...
IEEEARES
2008
IEEE
13 years 11 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen