Sciweavers

CCS
2000
ACM
13 years 12 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
CCS
2000
ACM
13 years 12 months ago
Evaluating certificate status information mechanisms
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from aca...
John Iliadis, Diomidis Spinellis, Dimitris Gritzal...
CCS
2000
ACM
13 years 12 months ago
A secure execution framework for Java
Manfred Hauswirth, Clemens Kerer, Roman Kurmanowyt...
CCS
2000
ACM
13 years 12 months ago
Funkspiel schemes: an alternative to conventional tamper resistance
Johan Håstad, Jakob Jonsson, Ari Juels, Moti...
CCS
2000
ACM
13 years 12 months ago
An authorization model for temporal data
Avigdor Gal, Vijayalakshmi Atluri
CCS
2000
ACM
13 years 12 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
CCS
2000
ACM
13 years 12 months ago
Distribution chain security
Ø Ð ÓÒØ ÒØ ×ØÖ ÙØ ÓÒ ×Ý×Ø Ñ× Û ÐÐ Ò Ð Ù× Ò ×× ÑÓ ¹ Ð× Ò Ø Ò Ö ÙØÙÖ Ø Ø ÒÒÓØ ÔÖ Ø ØÓ Ýº ÁÒ Ø × Ô Ô Ö¸ Û ÒØ Ý Ò ...
Glenn Durfee, Matthew K. Franklin
CCS
2000
ACM
13 years 12 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
CCS
2000
ACM
13 years 12 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel
CCS
2000
ACM
13 years 12 months ago
Operating system enhancements to prevent the misuse of system calls
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...