Sciweavers

1323 search results - page 119 / 265
» Updatable Security Views
Sort
View
131
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
PRDC
2005
IEEE
15 years 8 months ago
Server Protection through Dynamic Patching
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers...
Nicolas Loriant, Marc Ségura-Devillechaise,...
128
Voted
ACSAC
1999
IEEE
15 years 6 months ago
Transactions in Java Card
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
Marcus Oestreicher
118
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
103
Voted
ACSAC
2008
IEEE
15 years 4 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...