Sciweavers

ACSAC
2002
IEEE
14 years 4 months ago
A Security Architecture for Object-Based Distributed Systems
Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...
ACSAC
2002
IEEE
14 years 4 months ago
Security Architecture of the Austrian Citizen Card Concept
When admitting electronic media as a means for citizens to approach public authorities – i.e., when advancing official proceedings towards e-Government – security is an indisp...
Herbert Leitold, Arno Hollosi, Reinhard Posch
ACSAC
2002
IEEE
14 years 4 months ago
Detecting and Defending against Web-Server Fingerprinting
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered v...
Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
ACSAC
2002
IEEE
14 years 4 months ago
With Gaming Technology towards Secure User Interfaces
Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a gamefriendly platf...
Hanno Langweg
ACSAC
2002
IEEE
14 years 4 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
ACSAC
2002
IEEE
14 years 4 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ACSAC
2002
IEEE
14 years 4 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
ACSAC
2002
IEEE
14 years 4 months ago
Penetration Testing: A Duet
Daniel Geer, John Harthorne
ACSAC
2002
IEEE
14 years 4 months ago
Controlled Physical Random Functions
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk,...
ACSAC
2002
IEEE
14 years 4 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu