Sciweavers

SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 3 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
14 years 3 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
14 years 3 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
SP
1996
IEEE
14 years 3 months ago
Java Security: From HotJava to Netscape and Beyond
Drew Dean, Edward W. Felten, Dan S. Wallach
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 3 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
14 years 3 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CCS
1997
ACM
14 years 3 months ago
Conditional Purchase Orders
John Kelsey, Bruce Schneier
CCS
1997
ACM
14 years 3 months ago
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack
In this paper, we address the following problem: \ Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes. We exploit we...
Marc Joye, Jean-Jacques Quisquater
CCS
1997
ACM
14 years 3 months ago
Proactive Public Key and Signature Systems
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki...
CCS
1997
ACM
14 years 3 months ago
The Security of Static Typing with Dynamic Linking
Dynamic linking is a requirement for portable executable content. Executable content cannot know, ahead of time, where it is going to be executed, nor know the proper operating sy...
Drew Dean