Sciweavers

1564 search results - page 39 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
EUROPLOP
2006
14 years 11 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
CCS
2003
ACM
15 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
JUCS
2010
89views more  JUCS 2010»
14 years 8 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
EUROCRYPT
2006
Springer
15 years 1 months ago
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
The standard security definition of unconditional secure function evaluation, which is based on the ideal/real model paradigm, has the disadvantage of being overly complicated to w...
Claude Crépeau, George Savvides, Christian ...