Sciweavers

441 search results - page 20 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
VLDB
2005
ACM
135views Database» more  VLDB 2005»
14 years 3 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
SRDS
1997
IEEE
14 years 2 months ago
Comparing Operating Systems Using Robustness Benchmarks
When creating mission-critical distributed systems using off-the-shelf components, it is important to assess the dependability of not only the hardware, but the software as well. ...
Philip J. Koopman Jr., John Sung, Christopher P. D...
ISSTA
2010
ACM
14 years 1 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
NDSS
2009
IEEE
14 years 4 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
IEEEARES
2009
IEEE
14 years 4 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira