Sciweavers

5476 search results - page 181 / 1096
» Resettably Secure Computation
Sort
View
ACSAC
2000
IEEE
15 years 9 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
CCS
2007
ACM
15 years 8 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
IJISEC
2007
149views more  IJISEC 2007»
15 years 4 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
CCS
2009
ACM
15 years 9 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CVPR
2007
IEEE
16 years 6 months ago
Revocable Fingerprint Biotokens: Accuracy and Security Analysis
Terrance E. Boult, Walter J. Scheirer, Robert Wood...