Sciweavers

3003 search results - page 30 / 601
» Software Security: Building Security In
Sort
View
166
Voted
SRDS
2007
IEEE
15 years 10 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
ACSW
2006
15 years 5 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
107
Voted
WWCA
1997
Springer
15 years 8 months ago
Building Secure and Reliable Network Applications
Kenneth P. Birman