Sciweavers

273 search results - page 40 / 55
» Formal Implementation of Network Security Policies
Sort
View
ACSAC
2007
IEEE
14 years 13 days ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
CCS
2008
ACM
13 years 10 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
USENIX
2004
13 years 9 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...