Sciweavers

3003 search results - page 95 / 601
» Software Security: Building Security In
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
124
Voted
ICONS
2009
IEEE
15 years 10 months ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
149
Voted
COMSWARE
2008
IEEE
15 years 10 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
118
Voted
CD
2004
Springer
15 years 9 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry
ACSAC
1998
IEEE
15 years 8 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang