Sciweavers

1154 search results - page 168 / 231
» Making Self-organizing Systems Secure
Sort
View
EUROSYS
2009
ACM
15 years 6 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ con...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
WPES
2006
ACM
15 years 3 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
GRID
2005
Springer
15 years 3 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
EUROSYS
2010
ACM
15 years 2 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...