Sciweavers

1630 search results - page 84 / 326
» Secure Overlay Network Design
Sort
View
LISA
2004
14 years 11 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty
SIGSOFT
2005
ACM
15 years 10 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
TOSEM
2010
109views more  TOSEM 2010»
14 years 8 months ago
Modular aspect-oriented design with XPIs
e, or XPI. XPIs abstract crosscutting behaviors and make these abstractions explicit. XPIs can be used, albeit with limited enforcement of interface rules, with existing AOP langua...
Kevin J. Sullivan, William G. Griswold, Hridesh Ra...
ACSAC
2003
IEEE
15 years 3 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...
CCS
2010
ACM
14 years 8 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim