Sciweavers

5665 search results - page 265 / 1133
» Introduction to Computer Security
Sort
View
87
Voted
ICN
2001
Springer
15 years 5 months ago
Secure Communication: A New Application for Active Networks
SplitPath is a new application for the easy, well-known and provably secure one-time pad encryption scheme. Two problems hinder the one-time pad scheme from being applied in the ar...
Manuel Günter, Marc Brogle, Torsten Braun
71
Voted
NSDI
2008
15 years 2 months ago
IRBs and Security Research: Myths, Facts and Mission Creep
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations ...
Simson L. Garfinkel
DAGSTUHL
2001
15 years 1 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
104
Voted
ATC
2007
Springer
15 years 6 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
MIDDLEWARE
2007
Springer
15 years 6 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt