Sciweavers

18094 search results - page 117 / 3619
» The Architecture of Secure Systems
Sort
View
CCS
2004
ACM
15 years 5 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
PDCAT
2007
Springer
15 years 5 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
WIAS
2010
102views more  WIAS 2010»
14 years 10 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
ESORICS
2004
Springer
15 years 5 months ago
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi V. M...
CCS
2000
ACM
15 years 4 months ago
Operating system enhancements to prevent the misuse of system calls
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...