Sciweavers

359 search results - page 10 / 72
» Supporting Real World Security Models in Java
Sort
View
POLICY
2007
Springer
15 years 10 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
EUROCRYPT
2006
Springer
15 years 7 months ago
Language Modeling and Encryption on Packet Switched Networks
The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
Kevin S. McCurley
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 8 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
NSPW
2004
ACM
15 years 9 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
ICPPW
2005
IEEE
15 years 9 months ago
Performance Prophet: A Performance Modeling and Prediction Tool for Parallel and Distributed Programs
High-performance computing is essential for solving large problems and for reducing the time to solution for a single problem. Current top high-performance computing systems conta...
Sabri Pllana, Thomas Fahringer