Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
Abstract. This paper describes enhancements being made to the University of Southern California’s COnstructive COTS (COCOTS) integration cost model to address security concerns. ...
Donald J. Reifer, Barry W. Boehm, Murali Gangadhar...
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...