Sciweavers

12637 search results - page 54 / 2528
» Security for Extensible Systems
Sort
View
ACSAC
2003
IEEE
14 years 29 days ago
Honeypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
Lance Spitzner
DBSEC
2000
102views Database» more  DBSEC 2000»
13 years 9 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
SAFECOMP
2010
Springer
13 years 6 months ago
Assurance of Automotive Safety - A Safety Case Approach
A safety case should provide a clear, comprehensible and defensible argument, supported by evidence, that a system is acceptably safe to operate in a particular environment. This a...
Robert Palin, Ibrahim Habli
OOPSLA
1998
Springer
13 years 12 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
CSFW
2005
IEEE
14 years 1 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers