Sciweavers

2575 search results - page 19 / 515
» Providing security with insecure systems
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
ACSAC
2001
IEEE
15 years 3 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ESORICS
2010
Springer
15 years 25 days ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
HOTOS
2009
IEEE
15 years 3 months ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
103
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw