113
click to vote
SP
15 years 6 months ago
2007 IEEE
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
106
click to vote
SP
15 years 6 months ago
2007 IEEE
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
119
click to vote
SP
15 years 6 months ago
2007 IEEE
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
SP
15 years 6 months ago
2007 IEEE
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
111
click to vote
SP
15 years 6 months ago
2007 IEEE
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
|