Sciweavers

359 search results - page 10 / 72
» Supporting Real World Security Models in Java
Sort
View
POLICY
2007
Springer
15 years 3 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
EUROCRYPT
2006
Springer
15 years 1 months ago
Language Modeling and Encryption on Packet Switched Networks
The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
Kevin S. McCurley
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
NSPW
2004
ACM
15 years 2 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
ICPPW
2005
IEEE
15 years 3 months ago
Performance Prophet: A Performance Modeling and Prediction Tool for Parallel and Distributed Programs
High-performance computing is essential for solving large problems and for reducing the time to solution for a single problem. Current top high-performance computing systems conta...
Sabri Pllana, Thomas Fahringer