Sciweavers

3420 search results - page 65 / 684
» A Language-Based Approach to Security
Sort
View
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 10 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
USENIX
2007
14 years 11 days ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 4 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
SEC
2008
13 years 11 months ago
Interactive Selection of ISO 27001 Controls under Multiple Objectives
Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
Thomas Neubauer, Andreas Ekelhart, Stefan Fenz
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...