Sciweavers

3544 search results - page 428 / 709
» Information Security in Open Systems
Sort
View
ESEC
1995
Springer
15 years 3 months ago
Improvise: Interactive Multimedia Process Visualization Environment
Improvise is a multimedia system for modeling, visualizing and documenting software and business processes. It runs under Microsoft Windows and on most avors of the UNIX operating ...
Naser S. Barghouti, Eleftherios Koutsofios, Edith ...
ACSAC
2009
IEEE
15 years 6 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
WPES
2004
ACM
15 years 5 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano
OOPSLA
1992
Springer
15 years 3 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
CCS
2007
ACM
15 years 3 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...