Sciweavers

133 search results - page 17 / 27
» Securing Systems Against External Programs
Sort
View
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
13 years 11 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
ACSAC
2000
IEEE
13 years 12 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
ACSAC
2005
IEEE
14 years 1 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
SAC
2005
ACM
14 years 1 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...