Sciweavers

108 search results - page 14 / 22
» Enforcing Obligation with Security Monitors
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
CSFW
2010
IEEE
15 years 1 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
EDOC
2003
IEEE
15 years 2 months ago
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations
In this paper we sketch a framework supporting contract enactment within the context of virtual organisation units that are dynamically created in order to achieve a common object...
Theodosis Dimitrakos, Ivan Djordjevic, Zoran Milos...
ISSA
2004
14 years 10 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
NOMS
2002
IEEE
112views Communications» more  NOMS 2002»
15 years 2 months ago
Paradigms for mobile agent based active monitoring of network systems
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...
Anand Tripathi, Tanvir Ahmed, Sumedh Pathak, Megan...