Sciweavers

1462 search results - page 251 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ACSAC
2005
IEEE
15 years 5 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
NDSS
1998
IEEE
15 years 4 months ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young
GRID
2005
Springer
15 years 5 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
CISS
2008
IEEE
15 years 6 months ago
On flat-rate and usage-based pricing for tiered commodity internet services
In this note, we discuss issues pertaining to end-to-end qualityof-service management of commodity Internet applications and associated pricing incentive mechanisms. The issue of ...
George Kesidis, A. Das, Gustavo de Veciana