Sciweavers

1081 search results - page 14 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
14 years 8 days ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 1 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
USS
2010
13 years 6 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
ICETE
2004
253views Business» more  ICETE 2004»
13 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
OOPSLA
2005
Springer
14 years 2 months ago
DOSC: dispersed operating system computing
Over the past decade the sheer size and complexity of traditional operating systems have prompted a wave of new approaches to help alleviate the services provided by these operati...
Ramesh K. Karne, Karthick V. Jaganathan, Nelson Ro...