Sciweavers

12637 search results - page 94 / 2528
» Security for Extensible Systems
Sort
View
84
Voted
ISSE
2007
15 years 2 months ago
An intelligent system for automatic layout routing in aerospace design
Christian Van der Velden, Cees Bil, Xinghuo Yu, Ad...
105
Voted
ACSAC
2001
IEEE
15 years 6 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
142
Voted
CODASPY
2012
13 years 10 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
114
Voted
CCS
2004
ACM
15 years 8 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers