Sciweavers

2335 search results - page 108 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
USS
2008
15 years 7 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
CCS
2003
ACM
15 years 10 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ESORICS
2000
Springer
15 years 8 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
TSMC
2002
129views more  TSMC 2002»
15 years 4 months ago
A distributed robotic control system based on a temporal self-organizing neural network
A distributed robot control system is proposed based on a temporal self-organizing neural network, called competitive and temporal Hebbian (CTH) network. The CTH network can learn ...
Guilherme De A. Barreto, Aluizio F. R. Araú...