Sciweavers

320 search results - page 3 / 64
» Securing history: Privacy and accountability in database sys...
Sort
View
ACSAC
2009
IEEE
13 years 11 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 7 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...
EUROPKI
2004
Springer
14 years 1 months ago
Trustworthy Accounting for Wireless LAN Sharing Communities
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
Elias C. Efstathiou, George C. Polyzos
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 28 days ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
EUROPKI
2007
Springer
14 years 1 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier