Sciweavers

1154 search results - page 59 / 231
» Making Self-organizing Systems Secure
Sort
View
MINENET
2006
ACM
15 years 7 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
SOSP
2007
ACM
15 years 10 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
CSREASAM
2006
15 years 2 months ago
A Survey of Unimodal Biometric Methods
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. ...
Shahram Latifi, Nimalan Solayappan
ACSAC
2003
IEEE
15 years 6 months ago
Usable Access Control for the World Wide Web
While publishing content on the World Wide Web has moved within reach of the non-technical mainstream, controlling access to published content still requires expertise in Web serv...
Dirk Balfanz
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 11 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens