Sciweavers

2337 search results - page 107 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
CCS
2005
ACM
15 years 3 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 4 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
CLEF
2011
Springer
13 years 10 months ago
Towards a Living Lab for Information Retrieval Research and Development - A Proposal for a Living Lab for Product Search Tasks
Abstract. The notion of having a “living lab” to undertaken evaluations has been proposed by a number of proponents within the field of Information Retrieval (IR). However, wh...
Leif Azzopardi, Krisztian Balog
CCS
2007
ACM
15 years 4 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
MOBISYS
2008
ACM
15 years 9 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...