Sciweavers

881 search results - page 48 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
ACSAC
2004
IEEE
15 years 5 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
CCS
2007
ACM
15 years 8 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
81
Voted
SAFECOMP
2007
Springer
15 years 8 months ago
Survival by Deception
Abstract. A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously un...
Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Ja...
185
Voted
AIMS
2011
Springer
14 years 5 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
USS
2010
14 years 11 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp