Sciweavers

626 search results - page 52 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
QUANTUMCOMM
2009
Springer
14 years 2 months ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
CSREASAM
2007
13 years 9 months ago
Security Based Heuristic SAX for XML Parsing
- XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks i...
Wei Wang
IHI
2012
287views Healthcare» more  IHI 2012»
12 years 3 months ago
MARHS: mobility assessment system with remote healthcare functionality for movement disorders
Due to the global trend of aging societies with increasing demand for low cost and high quality healthcare services, there has been extensive research and development directed tow...
Sunghoon Ivan Lee, Jonathan Woodbridge, Ani Nahape...
ACSAC
2005
IEEE
14 years 1 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis