Sciweavers

1795 search results - page 65 / 359
» Security Models and Information Flow
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
13 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
ESORICS
2002
Springer
14 years 9 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
DSN
2007
IEEE
14 years 1 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
JTAER
2006
100views more  JTAER 2006»
13 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
MKWI
2008
133views Business» more  MKWI 2008»
13 years 11 months ago
Reference Modelling of the Financial Reporting Supply Chain Architecture
: The domain of business reporting and especially financial reporting plays an important role when discussing internal and external information flows among organizational units. Th...
Maciej Piechocki, Carsten Felden