Sciweavers

5484 search results - page 147 / 1097
» Almost-Everywhere Secure Computation
Sort
View
JERIC
2006
68views more  JERIC 2006»
15 years 4 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
ACSAC
2009
IEEE
15 years 11 months ago
SecureMR: A Service Integrity Assurance Framework for MapReduce
—MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service orient...
Wei Wei, Juan Du, Ting Yu, Xiaohui Gu
CCS
2007
ACM
15 years 10 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
130
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
VIZSEC
2004
Springer
15 years 9 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...