Sciweavers

2281 search results - page 136 / 457
» Security Patterns and Secure Systems Design
Sort
View
87
Voted
WETICE
2000
IEEE
15 years 5 months ago
Towards Secure e-Services
This poster paper presents a work in progress in the new emerging area of electronic services (e-services). The networked home with refrigerators and washing machines connected to...
Claudiu Duma, Almut Herzog, Nahid Shahmehri
112
Voted
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 7 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
82
Voted
CCS
2007
ACM
15 years 6 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao
USENIX
2007
15 years 2 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
CCS
2004
ACM
15 years 6 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu