Sciweavers

151 search results - page 17 / 31
» Flexible Alias Protection
Sort
View
CCS
2008
ACM
13 years 9 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
OSDI
2006
ACM
14 years 8 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
IDTRUST
2010
ACM
14 years 2 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
CRITIS
2007
13 years 9 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
ICWS
2007
IEEE
13 years 9 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu