Sciweavers

1186 search results - page 143 / 238
» A New Approach to Secure Logging
Sort
View
SIGPLAN
2008
15 years 21 days ago
Verified enforcement of stateful information release policies
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new a...
Nikhil Swamy, Michael Hicks
IWDW
2005
Springer
15 years 6 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
101
Voted
SOSP
2007
ACM
15 years 9 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
103
Voted
CCS
2004
ACM
15 years 6 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner