Sciweavers

98 search results - page 2 / 20
» Best Practices for Building a Security Operations Center
Sort
View
USENIX
2007
13 years 9 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
CCS
2008
ACM
13 years 8 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
INTERACT
2007
13 years 8 months ago
Sharing Perspectives on Community-Centered Design and International Development
Our work with communities in developing countries suggests that HCI practice is a long way from maturity in these contexts. With this SIG, we are seeking to build on a CHI2007 work...
Mike Best, Andrew M. Dearden, Susan M. Dray, Ann L...
ISTA
2008
13 years 8 months ago
A Framework for Building Mapping Operators Resolving Structural Heterogeneities
Seamless exchange of models among different modeling tools increasingly becomes a crucial prerequisite for the success of modeldriven engineering. Current best practices use model ...
Gerti Kappel, Horst Kargl, Thomas Reiter, Werner R...
COMPSEC
2006
143views more  COMPSEC 2006»
13 years 7 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu