Sciweavers

47 search results - page 3 / 10
» acsac 2005
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
We Need Assurance!
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
ACSAC
2005
IEEE
14 years 4 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
ACSAC
2005
IEEE
14 years 4 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
ACSAC
2005
IEEE
14 years 4 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
ACSAC
2005
IEEE
14 years 4 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...