Sciweavers

210 search results - page 6 / 42
» 20 Years of Operating Systems Security
Sort
View
XMLSEC
2003
ACM
14 years 18 days ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
USENIX
1990
13 years 8 months ago
The COPS Security Checker System
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to Unix. Without fail, ...
Daniel Farmer, Eugene H. Spafford
CASES
2010
ACM
13 years 5 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
SOUPS
2005
ACM
14 years 27 days ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
JSAC
2010
94views more  JSAC 2010»
13 years 5 months ago
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
During the last years several operators have expressed concerns about the continued growth of the BGP routing tables in the default-free zone. Proposed solutions for this issue ar...
Loránd Jakab, Albert Cabellos-Aparicio, Flo...