Sciweavers

6555 search results - page 187 / 1311
» Secure attribute-based systems
Sort
View
ICDCSW
2005
IEEE
15 years 8 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
98
Voted
OSDI
2008
ACM
16 years 2 months ago
Scalable I/O - A Well-Architected Way to Do Scalable, Secure and Virtualized I/O
Julian Satran, Leah Shalev, Muli Ben-Yehuda, Zorik...
86
Voted
LISA
2000
15 years 4 months ago
SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, ...
119
Voted
CCS
2008
ACM
15 years 4 months ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
ACSAC
2005
IEEE
15 years 8 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap