Sciweavers

3299 search results - page 151 / 660
» Privacy and Trusted Computing
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
127
Voted
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 10 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
145
Voted
SCAM
2005
IEEE
15 years 10 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
91
Voted
BIRTHDAY
2004
Springer
15 years 10 months ago
Preserving Privacy in Awareness Systems
Sameer Patil, Alfred Kobsa