Sciweavers

838 search results - page 163 / 168
» An Architecture for Network Layer Privacy
Sort
View
91
Voted
MTA
2000
128views more  MTA 2000»
14 years 9 months ago
A CORBA Based QOS Support for Distributed Multimedia Applications
AdvanceobjectorientedcomputingplatformsuchastheCommonObjectRequestBrokerArchitecture (CORBA) provides a conducive and standardized framework for the development of distributed appl...
Hung Keng Pung, Wynne Hsu, Bhawani S. Sapkota, Law...
ACSAC
2009
IEEE
15 years 4 months ago
Analyzing Information Flow in JavaScript-Based Browser Extensions
JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To ena...
Mohan Dhawan, Vinod Ganapathy
POLICY
2007
Springer
15 years 3 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
74
Voted
ACSAC
2003
IEEE
15 years 1 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
ACSAC
2008
IEEE
14 years 11 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....