Sciweavers

SP
1997
IEEE
163views Security Privacy» more  SP 1997»
14 years 3 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 3 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
14 years 3 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 3 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 3 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 3 months ago
A Secure and Reliable Bootstrap Architecture
William A. Arbaugh, David J. Farber, Jonathan M. S...
SP
1997
IEEE
114views Security Privacy» more  SP 1997»
14 years 3 months ago
Surviving information warfare attacks on databases
Paul Ammann, Sushil Jajodia, Catherine D. McCollum...
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 3 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
SAFECOMP
1998
Springer
14 years 3 months ago
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture
By-wire systems have been established for several years in the area of aircraft construction and there are now approaches to utilize this technology in vehicles. The required elect...
Thomas Ringler, J. Steiner, R. Belschner, Bernd He...