Sciweavers

5255 search results - page 378 / 1051
» Formal Methods for Privacy
Sort
View
SP
2009
IEEE
15 years 11 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
NDSS
2009
IEEE
15 years 11 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
IEEEARES
2008
IEEE
15 years 11 months ago
Quantitative Assessment of Enterprise Security System
—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...
IEEEARES
2008
IEEE
15 years 11 months ago
Finding Evidence of Antedating in Digital Investigations
— Finding evidence of antedating is an important goal in many digital investigations. This paper explores how causality can expose antedating by investigating storage systems for...
Svein Yngvar Willassen
IEEEARES
2007
IEEE
15 years 11 months ago
On the Assessment of the Interaction Quality of Users with Cerebral Palsy
This paper is the continuation of a series of related work about experimentation of alternative ways of interaction with computers for disabled people (concretely with users suffe...
Cesar Mauri, Toni Granollers, Agusti Solanas