Sciweavers

2281 search results - page 246 / 457
» Security Patterns and Secure Systems Design
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
PET
2004
Springer
15 years 8 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
16 years 4 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 3 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
HOTNETS
2010
14 years 10 months ago
The home needs an operating system (and an app store)
Abstract-- We argue that heterogeneity is hindering technological innovation in the home--homes differ in terms of their devices and how those devices are connected and used. To ab...
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. ...