Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-...
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson ...
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...