Sciweavers

1788 search results - page 61 / 358
» Integrating Security into the Curriculum
Sort
View
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 3 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ASPLOS
2011
ACM
14 years 3 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
CCS
2010
ACM
15 years 2 days ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 11 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
JTAER
2006
100views more  JTAER 2006»
14 years 11 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane