Sciweavers

3605 search results - page 187 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
SP
1999
IEEE
125views Security Privacy» more  SP 1999»
15 years 9 months ago
A Multi-Threading Architecture for Multilevel Secure Transaction Processing
A TCB and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment is presented. Our design ...
Haruna R. Isa, William R. Shockley, Cynthia E. Irv...
ACSAC
2009
IEEE
15 years 11 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
WETICE
2000
IEEE
15 years 9 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
AGENTS
2000
Springer
15 years 9 months ago
Unsupervised clustering of robot activities: a Bayesian approach
Our goal is for robots to learn conceptual systems su cient for natural language and planning. The learning should be autonomous, without supervision. The rst steps in building a ...
Marco Ramoni, Paola Sebastiani, Paul R. Cohen
IH
2001
Springer
15 years 9 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn