Sciweavers

1140 search results - page 168 / 228
» A Purpose-Based Access Control Model
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
OSDI
2006
ACM
14 years 8 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
ICSE
2003
IEEE-ACM
14 years 8 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado
ICMLA
2009
14 years 4 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
LATA
2010
Springer
14 years 2 months ago
Using Sums-of-Products for Non-standard Reasoning
Abstract. An important portion of the current research in Description Logics is devoted to the expansion of the reasoning services and the developement of algorithms that can adequ...
Rafael Peñaloza