Sciweavers

806 search results - page 132 / 162
» Privacy Policy Referencing
Sort
View
SEC
2007
13 years 11 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
RE
2006
Springer
13 years 9 months ago
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...
CCS
2010
ACM
13 years 8 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
IWSEC
2010
Springer
13 years 8 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
ACSAC
2010
IEEE
13 years 8 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria