Sciweavers

762 search results - page 45 / 153
» Security Contexts in Autonomic Systems
Sort
View
ICCSA
2005
Springer
15 years 5 months ago
Reflective Middleware for Location-Aware Application Adaptation
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
IEEEARES
2010
IEEE
15 years 6 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 6 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
FPL
2008
Springer
112views Hardware» more  FPL 2008»
15 years 1 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
SPW
2005
Springer
15 years 5 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...