Sciweavers

2213 search results - page 324 / 443
» Software Security
Sort
View
119
Voted
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 7 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
140
Voted
AGENTS
2000
Springer
15 years 7 months ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
143
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
INFOCOM
1999
IEEE
15 years 7 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
135
Voted
IWAN
1999
Springer
15 years 7 months ago
ANMAC: An Architectural Framework for Network Management and Control using Active Networks
In this paper, we propose a new framework called Active Network Management and Control (ANMAC) for the management and control of high speed networks. The software architecture in A...
Samphel Norden, Kenneth F. Wong