Sciweavers

327 search results - page 19 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
TMC
2010
179views more  TMC 2010»
13 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
CCS
2009
ACM
14 years 3 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
APSEC
2008
IEEE
14 years 3 months ago
Behavioral Specification of Real-Time Requirements
This paper aims to present a systematic method to: (1) specify high-level and event based real-time requirements and (2) map the specified requirements to low-level and state-base...
Seyed Morteza Babamir, Faezeh Sadat Babamir
ICDCS
1999
IEEE
14 years 1 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...