Sciweavers

502 search results - page 3 / 101
» An Audit Logic for Accountability
Sort
View
80
Voted
ACSAC
2004
IEEE
15 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
67
Voted
MEDINFO
2007
130views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
What's in a code? Towards a Formal Account of the Relation of Ontologies and Coding Systems
Terminologies are increasingly based on “ontologies” developed in description logics and related languages such as the new Web Ontology Language, OWL. The use of description l...
Alan L. Rector
85
Voted
ICFP
2008
ACM
15 years 9 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
FAST
2007
14 years 11 months ago
Strong Accountability for Network Storage
This paper presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. A CATS server annotates read and write res...
Aydan R. Yumerefendi, Jeffrey S. Chase
ICNP
2007
IEEE
15 years 3 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...