Sciweavers

2560 search results - page 99 / 512
» Securing VO Management
Sort
View
ICSEA
2007
IEEE
15 years 10 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
DISCEX
2003
IEEE
15 years 9 months ago
An Aspect-Oriented Security Framework
The security of a software system is an attribute that permeates the whole system. As such, any attempt to address security concerns in a software system must, of necessity, be gl...
Viren Shah, Frank Hill
133
Voted
CCS
2003
ACM
15 years 7 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
134
Voted
SEC
2003
15 years 5 months ago
World Framework for Security Benchmark Changes
: The paper contains presentation of a framework, which would significantly increase quality of information security products and procedures, and Commentary on difficulties of impl...
Lech J. Janczewski, Andrew M. Colarik
CCS
2010
ACM
15 years 4 months ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger