Sciweavers

2213 search results - page 237 / 443
» Software Security
Sort
View
138
Voted
FORTE
2004
15 years 5 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
136
Voted
FAC
2008
67views more  FAC 2008»
15 years 4 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
UIALL
2004
Springer
15 years 9 months ago
A Question of Realism
Abstract. We present the results of an exploratory study investigating the feasibility of using multimedia software to teach life skills to adults with learning difficulties. As a ...
Richard Hetherington, Alison Crerar, Phil Turner
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 10 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
HOTOS
1997
IEEE
15 years 8 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley