Sciweavers

210 search results - page 2 / 42
» 20 Years of Operating Systems Security
Sort
View
PERCOM
2007
ACM
14 years 5 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
WORM
2004
13 years 7 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
ACSAC
2002
IEEE
13 years 11 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
HOTOS
1997
IEEE
13 years 10 months ago
Operating Systems for Component Software Environments
Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems are designed to host a...
Noah Mendelsohn
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
14 years 21 days ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin