Sciweavers

228 search results - page 21 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
BCSHCI
2008
13 years 8 months ago
Workshop HCI for medicine and health care (HCI4MED)
Ensuring good usability can be seen as the key success factor in our whole digital world: technology must support people. In particular, Medicine and Healthcare are currently subj...
Andreas Holzinger, Harold W. Thimbleby, Russell Be...
NETWORK
2008
151views more  NETWORK 2008»
13 years 7 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis
ECOOPW
1999
Springer
13 years 11 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
GI
2003
Springer
14 years 18 days ago
An Integrated Approach to Survivability Analysis of Large Complex Critical Infrastructures
: The integrated approach for analysis of Large Complex Critical Infrastructures (LCCIs) to afford survivability aimed at preparing a Roadmap for Research and Development for criti...
Sandro Bologna, Thomas Beer