Sciweavers

1028 search results - page 149 / 206
» Using Attack Graphs to Design Systems
Sort
View
CN
2007
133views more  CN 2007»
13 years 8 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
14 years 9 months ago
Vispedia: on-demand data integration for interactive visualization and exploration
Wikipedia is an example of the large, collaborative, semi-structured data sets emerging on the Web. Typically, before these data sets can be used, they must transformed into struc...
Bryan Chan, Justin Talbot, Leslie Wu, Nathan Sakun...
SOUPS
2010
ACM
14 years 19 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ICSE
2000
IEEE-ACM
14 years 10 days ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine