Sciweavers

1186 search results - page 64 / 238
» A New Approach to Secure Logging
Sort
View
93
Voted
ICIW
2009
IEEE
15 years 7 months ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair
96
Voted
ICALP
2005
Springer
15 years 6 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
85
Voted
ACSAC
2003
IEEE
15 years 5 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
93
Voted
PVLDB
2010
110views more  PVLDB 2010»
14 years 11 months ago
Behavior Based Record Linkage
In this paper, we present a new record linkage approach that uses entity behavior to decide if potentially different entities are in fact the same. An entity’s behavior is extra...
Mohamed Yakout, Ahmed K. Elmagarmid, Hazem Elmelee...
105
Voted
DSN
2008
IEEE
15 years 2 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu