A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation ke...
Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine...
Many safety-critical embedded systems are subject to certification requirements; some systems may be required to meet multiple sets of certification requirements, from different c...
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
Organizations are adopting datawarehouses to manage information efficiently as "the" main organizational asset. It is essential that we can assure the information qualit...
Coral Calero, Mario Piattini, Carolina Pascual, Ma...
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...