Sciweavers

1564 search results - page 60 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
CCS
2010
ACM
14 years 10 months ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger
CORR
2010
Springer
66views Education» more  CORR 2010»
14 years 10 months ago
Solutions to the GSM Security Weaknesses
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ESORICS
2004
Springer
15 years 3 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
COMPSAC
2007
IEEE
15 years 4 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
CCS
2007
ACM
15 years 4 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...