Sciweavers

6555 search results - page 190 / 1311
» Secure attribute-based systems
Sort
View
128
Voted
ISW
2000
Springer
15 years 6 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
143
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 4 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
120
Voted
INFORMATICALT
2000
120views more  INFORMATICALT 2000»
15 years 2 months ago
Mobile Code Alternatives for Secure Environments
Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be...
Algirdas Pakstas, Igor Shagaev
109
Voted
CCS
2008
ACM
15 years 4 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
122
Voted
CSFW
2007
IEEE
15 years 9 months ago
Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinc...
Paritosh Shroff, Scott F. Smith, Mark Thober