Sciweavers

3605 search results - page 197 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
CCS
2009
ACM
16 years 5 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
DAC
2010
ACM
15 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DAC
2009
ACM
15 years 2 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha