The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently runni...
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...