Sciweavers

1715 search results - page 278 / 343
» Trust and Reputation Systems
Sort
View
HOTDEP
2008
107views Hardware» more  HOTDEP 2008»
15 years 4 days ago
Reverse-Engineering Drivers for Safety and Portability
Device drivers today lack two important properties: guaranteed safety and cross-platform portability. We present an approach to incrementally achieving these properties in drivers...
Vitaly Chipounov, George Candea
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
14 years 11 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
ISSA
2004
14 years 11 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
PDCN
2004
14 years 11 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
ECIS
2000
14 years 11 months ago
The Issue of Mutuality in ECR Adoption: A Case Study
The adoption of ECR has been slow in many regions, despite its many potential benefits to manufacturers, distributors and retailers within a supply chain through reduction of inven...
Sherah Kurnia, Robert B. Johnston