Sciweavers

331 search results - page 10 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
VLDB
2002
ACM
126views Database» more  VLDB 2002»
14 years 9 months ago
FAS - A Freshness-Sensitive Coordination Middleware for a Cluster of OLAP Components
Data warehouses offer a compromise between freshness of data and query evaluation times. However, a fixed preference ratio between these two variables is too undifferentiated. Wit...
Uwe Röhm, Klemens Böhm, Hans-Jörg S...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
PST
2004
14 years 10 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
ACSAC
2009
IEEE
15 years 4 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...

Publication
117views
14 years 5 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...