Sciweavers

EUROSEC
2009
ACM
14 years 6 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
EUROSEC
2009
ACM
14 years 6 months ago
Preventing identity theft with electronic identity cards and the trusted platform module
Andreas Klenk, Holger Kinkelin, Christoph Eunicke,...
EUROSEC
2009
ACM
14 years 6 months ago
Breaking the memory secrecy assumption
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
EUROSEC
2009
ACM
14 years 6 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
EUROSEC
2009
ACM
14 years 6 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
EUROSEC
2009
ACM
14 years 6 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
EUROSEC
2009
ACM
14 years 6 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...