Sciweavers

1770 search results - page 279 / 354
» Writing requirements in computer security
Sort
View
USENIX
2003
13 years 11 months ago
A Multi-User Virtual Machine
Recent efforts aimed at improving the scalability of the JavaTM platform have focused primarily on the safe collocation of multiple applications in the virtual machine. This is of...
Grzegorz Czajkowski, Laurent Daynès, Ben Ti...
CCR
2007
119views more  CCR 2007»
13 years 10 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooļ...
Felipe Huici, Mark Handley
INFOCOM
2012
IEEE
12 years 8 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
CSE
2009
IEEE
14 years 4 months ago
A Framework for Enforcing Constrained RBAC Policies
ā€”Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are speciļ¬ed in the pol...
Jason Crampton, Hemanth Khambhammettu
IPOM
2009
Springer
14 years 4 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traļ¬ƒc usag...
Haesung Hwang, Shingo Ata, Masayuki Murata