Sciweavers

SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 11 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
13 years 11 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
SP
2002
IEEE
13 years 11 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 11 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
13 years 11 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
13 years 11 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
SP
2002
IEEE
121views Security Privacy» more  SP 2002»
13 years 11 months ago
Intrusion-Tolerant Enclaves
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be ab...
Bruno Dutertre, Valentin Crettaz, Victoria Stavrid...
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
13 years 11 months ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
13 years 11 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler