Sciweavers

626 search results - page 35 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
VIIP
2001
13 years 11 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
ITRUST
2004
Springer
14 years 3 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
CCS
2010
ACM
14 years 1 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou
TRUSTBUS
2005
Springer
14 years 3 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
EIT
2008
IEEE
14 years 4 months ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...