Sciweavers

40 search results - page 3 / 8
» acsac 2003
Sort
View
ACSAC
2003
IEEE
14 years 4 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
ACSAC
2003
IEEE
14 years 4 months ago
Security Design in Online Games
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
Jeff Jianxin Yan
ACSAC
2003
IEEE
14 years 4 months ago
Automatic Reassembly of Document Fragments via Context Based Statistical Models
Reassembly of fragmented objects from a collection of randomly mixed fragments is a common problem in classical forensics. In this paper we address the digital forensic equivalent...
Kulesh Shanmugasundaram, Nasir D. Memon
ACSAC
2003
IEEE
14 years 4 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
ACSAC
2003
IEEE
14 years 4 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford