Sciweavers

1323 search results - page 140 / 265
» Updatable Security Views
Sort
View
157
Voted
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 6 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
121
Voted
LISA
2003
15 years 4 months ago
Virtual Appliances for Deploying and Maintaining Software
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...
122
Voted
COOPIS
2004
IEEE
15 years 6 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
113
Voted
WWW
2007
ACM
16 years 3 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 9 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung