Sciweavers

2178 search results - page 103 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2010
ACM
13 years 7 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
CCS
2001
ACM
14 years 1 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
WWW
2010
ACM
14 years 4 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
CEEMAS
2003
Springer
14 years 2 months ago
Communication Security in Multi-agent Systems
Both, research and application development in the area of multi-agent systems currently undertakes rapid expansion. In order to use multi-agent technology in real applications, it ...
Petr Novák, Milan Rollo, Jirí Hod&ia...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 2 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan