Sciweavers

123 search results - page 12 / 25
» Security and Source Code Access: Issues and Realities
Sort
View
TDSC
2010
218views more  TDSC 2010»
13 years 5 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
ACSAC
2007
IEEE
14 years 1 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
14 years 1 months ago
Markov Chain Monte Carlo Detection Methods for High SNR Regimes
—Statistical detectors that are based on Markov chain Monte Carlo (MCMC) simulators have emerged as promising low-complexity solutions to both multiple-input multipleoutput (MIMO...
Salam Akoum, Ronghui Peng, Rong-Rong Chen, Behrouz...
SIGCOMM
2012
ACM
11 years 9 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
CCS
2010
ACM
13 years 7 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster