Sciweavers

2236 search results - page 232 / 448
» Secure Software Design in Practice
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
112
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
WPES
2005
ACM
15 years 9 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 7 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
PET
2010
Springer
15 years 7 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing users...
Sai Teja Peddinti, Nitesh Saxena