Sciweavers

309 search results - page 49 / 62
» A Type System for Expressive Security Policies
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
FUIN
2007
99views more  FUIN 2007»
13 years 7 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
RTA
2005
Springer
14 years 1 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
IWIA
2005
IEEE
14 years 1 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
ECIS
2001
13 years 9 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward