Sciweavers

878 search results - page 47 / 176
» A Compiler-Based Approach to Data Security
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
ACSAC
2005
IEEE
15 years 3 months ago
Privacy Requirements Implemented with a JavaCard
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
Anas Abou El Kalam, Yves Deswarte
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 3 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
CSREASAM
2007
14 years 11 months ago
Survey of Supercomputer Cluster Security Issues
- The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters...
George Markowsky, Linda Markowsky
BIRTHDAY
2010
Springer
14 years 8 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...