Sciweavers

SP
2000
IEEE
14 years 4 months ago
Will Openish Source Really Improve Security
Will openish source really improve security? No.
Gary McGraw
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 4 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
SP
2000
IEEE
14 years 4 months ago
Security and Source Code Access: Issues and Realities
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
Steven B. Lipner
SP
2000
IEEE
133views Security Privacy» more  SP 2000»
14 years 4 months ago
Is Electronic Privacy Achievable?
Cynthia E. Irvine, Timothy E. Levin
SP
2000
IEEE
14 years 4 months ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
14 years 4 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
SP
2000
IEEE
14 years 4 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 4 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
CSFW
2000
IEEE
14 years 4 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek