Sciweavers

1737 search results - page 111 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 6 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
CCS
2009
ACM
15 years 6 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
FMOODS
2003
15 years 1 months ago
A Rewriting Based Model for Probabilistic Distributed Object Systems
Concurrent and distributed systems have traditionally been modelled using nondeterministic transitions over configurations. The minism provides an abstraction over scheduling, net...
Nirman Kumar, Koushik Sen, José Meseguer, G...
DESRIST
2009
Springer
133views Education» more  DESRIST 2009»
15 years 4 months ago
Using the metaphysics of quality to define design science
Design has evolved from a craft into an academic discipline, but it still falls short on defining its own science. I review previous approaches to Design Science and conclude that...
Christoph Bartneck