Sciweavers

2486 search results - page 91 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
CHIMIT
2008
ACM
13 years 10 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CCS
2006
ACM
14 years 17 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
JUCS
2010
130views more  JUCS 2010»
13 years 7 months ago
CAUCE: Model-driven Development of Context-aware Applications for Ubiquitous Computing Environments
: In order to develop context-aware applications for ubiquitous computing environments we have defined an MDA approach that defines three layers of models. The first layer captures...
Ricardo Tesoriero, José A. Gallud, Mar&iacu...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 9 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan