Sciweavers

1336 search results - page 194 / 268
» codes 2005
Sort
View
97
Voted
ACSAC
2005
IEEE
15 years 6 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
102
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
89
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Model Checking An Entire Linux Distribution for Security Violations
Software model checking has become a popular tool for verifying programs’ behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...
ACSC
2005
IEEE
15 years 6 months ago
Fractal Image Compression on a Pseudo Spiral Architecture
Fractal image compression is a relatively recent image compression method which exploits similarities in different parts of the image. The basic idea is to represent an image by f...
Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian H...
97
Voted
AINA
2005
IEEE
15 years 6 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson