Sciweavers

SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 2 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 3 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
14 years 3 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 3 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
14 years 3 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 3 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 3 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 3 months ago
A Secure and Reliable Bootstrap Architecture
William A. Arbaugh, David J. Farber, Jonathan M. S...