Sciweavers

754 search results - page 88 / 151
» Can self-managed systems be trusted
Sort
View
CODASPY
2012
12 years 6 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
MOBISEC
2009
Springer
14 years 4 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
IEEEARES
2008
IEEE
14 years 4 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
WPES
2003
ACM
14 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
HASE
2007
IEEE
14 years 2 months ago
Precise Documentation of Critical Software
This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software mo...
David Lorge Parnas, Sergiy A. Vilkomir