Sciweavers

2429 search results - page 71 / 486
» Using Aspects to Design a Secure System
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
MEDES
2010
ACM
13 years 3 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
IADIS
2004
13 years 10 months ago
Designing a personalized E-learning experience using learning objects
This paper aims to provide an experimental vision of the process of course creation using learning objects obtained in the <e-aula> project, a pilot e-learning system concei...
Pilar Sancho, Borja Manero, Baltasar Fernán...
JDCTA
2010
125views more  JDCTA 2010»
13 years 3 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 1 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...