Sciweavers

577 search results - page 67 / 116
» Engineering Sufficiently Secure Computing
Sort
View
112
Voted
EUROMICRO
2004
IEEE
15 years 6 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
107
Voted
CCS
2007
ACM
15 years 8 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
132
Voted
CCS
2006
ACM
15 years 6 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
101
Voted
JOC
2002
76views more  JOC 2002»
15 years 2 months ago
A Note on Negligible Functions
In theoretical cryptography, one formalizes the notion of an adversary's success probability being "too small to matter" by asking that it be a negligible function ...
Mihir Bellare
100
Voted
VIS
2004
IEEE
137views Visualization» more  VIS 2004»
16 years 3 months ago
Generating Realistic Images from Hydrothermal Plume Data
Most data used in the study of seafloor hydrothermal plumes consists of sonar (acoustic) scans and sensor readings. Visual data captures only a portion of the sonar data range due...
Deborah Silver, Jamshed Dastur, Karen G. Bemis, Kr...