Sciweavers

2386 search results - page 258 / 478
» Database Security 2000
Sort
View
ACSAC
2000
IEEE
15 years 3 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
ACSAC
2000
IEEE
15 years 3 months ago
ITS4: A Static Vulnerability Scanner for C and C++ Code
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
CSFW
2000
IEEE
15 years 3 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
ACISP
2000
Springer
15 years 3 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
AGENTS
2000
Springer
15 years 3 months ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer