Sciweavers

1116 search results - page 51 / 224
» Secure Mediation: Requirements and Design
Sort
View
ACMDIS
2000
ACM
14 years 1 months ago
Mapping the Physical World to Psychological Reality: Creating Synthetic Environments
The successful creation of telepresence and virtual environments requires a change in design paradigm. We must move away from attempts to recreate reality in its entirety toward t...
Ronald W. Noel, Claudia M. Hunter
WWW
2010
ACM
14 years 4 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
APSEC
2006
IEEE
14 years 3 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
CCS
2006
ACM
14 years 28 days ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song