Sciweavers

210 search results - page 6 / 42
» 20 Years of Operating Systems Security
Sort
View
82
Voted
XMLSEC
2003
ACM
15 years 3 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
75
Voted
USENIX
1990
14 years 11 months ago
The COPS Security Checker System
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to Unix. Without fail, ...
Daniel Farmer, Eugene H. Spafford
107
Voted
CASES
2010
ACM
14 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
78
Voted
SOUPS
2005
ACM
15 years 3 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
JSAC
2010
94views more  JSAC 2010»
14 years 8 months ago
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
During the last years several operators have expressed concerns about the continued growth of the BGP routing tables in the default-free zone. Proposed solutions for this issue ar...
Loránd Jakab, Albert Cabellos-Aparicio, Flo...