Sciweavers

8 search results - page 2 / 2
» Modular Access Control Via Strategic Rewriting
Sort
View
143
Voted
USENIX
2004
15 years 2 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
91
Voted
TISSEC
2002
75views more  TISSEC 2002»
15 years 23 days ago
Termination in language-based systems
Language runtime systems are increasingly being embedded in systems to support runtime extensibility via mobile code. Such systems raise a number of concerns when the code running...
Algis Rudys, Dan S. Wallach
120
Voted
CCS
2007
ACM
15 years 7 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...