Sciweavers

238 search results - page 38 / 48
» Security Control for COTS Components
Sort
View
IEEEARES
2008
IEEE
14 years 5 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
SDMW
2004
Springer
14 years 4 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
JPDC
2007
117views more  JPDC 2007»
13 years 10 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ACSAC
2006
IEEE
14 years 5 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
POPL
2012
ACM
12 years 6 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama