This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
Constraint relaxation is a frequently used technique for managing over-determined constraint satisfaction problems. A problem in constraint relaxation is the selection of the appr...
R. R. Bakker, F. Dikker, F. Tempelman, P. M. Wognu...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
—The proliferation of wireless systems requires that the coexistence between heterogeneous technologies be addressed. This paper presents a cognitive framework in which sensingba...
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...