3,221 Hits in 10.3 sec

Security architectures for network clients

Victoria Skoularidou, Diomidis Spinellis
2003 Information Management & Computer Security  
The black-and-white security policy for executing applets in JDK 1.1 changed to a shades-of-gray model in JDK 1.2 where more fine-grained access control is supported.  ...  Introduction Despite effort being expended to secure network clients, these are increasingly and continuously succumbing to malicious software (viruses, worms, and Trojan horses).  ... 
doi:10.1108/09685220310468664 fatcat:2rgdwt27ivbfvlgjowqk2frhnm

A Theory of Gray Security Policies [chapter]

Donald Ray, Jay Ligatti
2015 Lecture Notes in Computer Science  
Included are generalizations from traditional definitions of safety and liveness policies to definitions of gray-safety and gray-liveness policies.  ...  This paper generalizes traditional models of security policies, from specifications of whether programs are secure, to specifications of how secure programs are.  ...  Introduction Computer-security policies have traditionally been modeled as predicates, partitioning the secure from the insecure system behaviors.  ... 
doi:10.1007/978-3-319-24177-7_24 fatcat:4wb4qtx4gnbozizwqneujjvfje


Vacha Dave, Saikat Guha, Yin Zhang
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Ad networks today, sadly, rely primarily on security through obscurity to defend against click-spam.  ...  Click-spam in online advertising, where unethical publishers use malware or trick users into clicking ads, siphons off hundreds of millions of advertiser dollars meant to support free websites and apps  ...  The paper is much improved because of their inputs and suggestions.  ... 
doi:10.1145/2508859.2516688 dblp:conf/ccs/DaveGZ13 fatcat:s527566pufarpbt2xqki25nwyq

PoliSeer: A Tool for Managing Complex Security Policies

Daniel Lomsak, Jay Ligatti
2011 Journal of Information Processing  
Complex software-security policies are difficult to specify, understand, and update.  ...  This paper describes the design and implementation of PoliSeer and a case study in which we have used PoliSeer to specify and enforce a policy on PoliSeer itself.  ...  Because computer users are accustomed to this sort of expand-and-contract navigation interface (e.g., the Windows file explorer and many application programs employ the same interface), navigating policy  ... 
doi:10.2197/ipsjjip.19.292 fatcat:p3gvxms265bubgio6rdbizyufu

Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics

Zhenyu Cheryl Qian, Yingjie Victor Chen
2014 Security Informatics  
Analysis of spatiotemporal network security data takes place both conditionally and in sequence.  ...  We consider them as various representations of the same data and aim to enhance the fluency of navigation across these representations.  ...  Introduction One of the biggest challenges the information security society faces is analyzing large-scale spatiotemporal datasets.  ... 
doi:10.1186/s13388-014-0006-4 fatcat:ixznm7unhneojfxj4fzzjkumym

Contextual network navigation to provide situational awareness for network administrators

Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts
2015 2015 IEEE Symposium on Visualization for Cyber Security (VizSec)  
One of the goals of network administrators is to identify and block sources of attacks from a network steam.  ...  These two techniques can potentially highlight common pathways and/or networks to allow faster, more complete resolution to the incident, as well as fragile or incomplete routing pathways to/from a network  ...  INTRODUCTION System administrators face many challenges when dealing with network attacks.  ... 
doi:10.1109/vizsec.2015.7312769 dblp:conf/vizsec/GrayRR15 fatcat:5fswohhlybeglltzsf2wn3zcfm

A novel approach for Multi-Tier security for XML based documents

Bimlendu Prasad Verma
2012 IOSR Journal of Computer Engineering  
However the data need to be secured in respect of confidentiality, integrity, authenticity and non-reproduction.  ...  Most of the approaches of security focus towards securing the access to the data rather than securing the data itself.  ...  Acknowledgements We would like to thank Dr D.B. Ojha of Faculty of Engineering and Technology, Mewar University for encouraging and guiding us to write this paper. Acknowledgements  ... 
doi:10.9790/0661-0540104 fatcat:dlvsp3hzqjarpimzagisq7qrce

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Mahsa Seyyedtaj, Mohammad Ali Jabraeil Jamali
2014 International Journal of Computer Applications Technology and Research  
However, these characteristics make ad-hoc networks vulnerable to different types of attacks and make implementing security in ad-hoc network a challenging task.  ...  Considering the delivery rate of packets, routing overhead, network delay, Simulation results show that Protocols operate under different constraints and none of the protocols are not able to provide security  ...  Mobile Computing Security Issues So some of the new security issues introduced in mobile computing are originated from the security issues of wireless networks and distributed computing systems.  ... 
doi:10.7753/ijcatr0309.1001 fatcat:n7yb26a6zbgwnpvfmvka3cnpoq

SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms

Enrico Bertini, Patrick Hertzog, Denis Lalanne
2007 2007 IEEE Symposium on Visual Analytics Science and Technology  
The tool is meant to be a complementary support to the routine activity of network monitoring, enabling a retrospective view on the alarms generated during and extended period of time.  ...  evolves and thus in devising new security policies for the future.  ...  ACKNOWLEDGEMENTS This work has been developed under the project "Network Security Intelligence through Distributed User Behaviour Modelling and Interactive Visualizations" funded by KTI/CTI (Swiss Confederation's  ... 
doi:10.1109/vast.2007.4389007 dblp:conf/ieeevast/BertiniHL07 fatcat:36heup6c2zci5eqr3zhfqjfcoa

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System [article]

Josh Benaloh and Mike Byrne and Philip Kortum and Neal McBurnett and Olivier Pereira and Philip B. Stark and Dan S. Wallach
2012 arXiv   pre-print
In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to  ...  It provides both a paper trail and end-to-end cryptography using COTS hardware. It is designed to support both ballot-level risk-limiting audits, and auditing by individual voters and observers.  ...  Figure 1 : The design of the STAR-Vote system. Green objects are computers, white objects are paper records, and other objects are shaded in gray.  ... 
arXiv:1211.1904v1 fatcat:pvtsvlmarvb7njvxoe3iwub5uu

Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability

Chun Kiat Tan, Jason Changwei Ng, Xiaotian Xu, Chueh Loo Poh, Yong Liang Guan, Kenneth Sheah
2010 Journal of digital imaging  
Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet.  ...  Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information.  ...  This includes secure exchange of DICOM information over open networks and logging of security information (e.g., access rights and time stamping of the images) and as a key authority in charge of the storage  ... 
doi:10.1007/s10278-010-9295-4 pmid:20414697 pmcid:PMC3092037 fatcat:cyq7z5l5czdazi5u5sn6mg7ati

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
With the increasing number and complexity of security problems and solutions, we believe this is the right moment to step back and systematically re-evaluate the Android security architecture and security  ...  The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  INTRODUCTION Android security has been in the spotlight ever since the first Android-powered phone debuted in October 2008.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Protecting Future Maritime Communication

Christian Frøystad, Karin Bernsmed, Per Håkon Meland
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
Evolving from isolated chunks of hollow metal containers, ships are becoming more and more like interconnected floating computers, and thus increasingly exposed to unwanted cyber events.  ...  CCS CONCEPTS • Security and privacy → Domain-specific security and privacy architectures; KEYWORDS cyber security, maritime communication, PKI, VDES  ...  ACKNOWLEDGMENTS The research leading to these results has been performed in the CySiMS project, which received funding from the The Research Council of Norwegian under Grant No.: 256508, and the SafeCOPproject  ... 
doi:10.1145/3098954.3103169 dblp:conf/IEEEares/FroystadBM17 fatcat:a3fmyubhi5gjlhjwwkx7ppn3ca

Dynamic Exploration of Recording Sessions between Jazz Musicians over Time

Darya Filippova, Michael Fitzgerald, Carl Kingsford, Fernando Benadon
2012 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing  
We develop a new measure of collaboration strength that is used to highlight strong and weak collaborations in the network view.  ...  The system consists of an easy-to-use web application that marries an ego-network view of collaborations with an interactive timeline.  ...  The authors wish to thank Guillaume Marçais, Geet Duggal, and Rob Patro for insightful discussions. We are especially thankful to Yana Sakellion who helped with visual design.  ... 
doi:10.1109/socialcom-passat.2012.78 dblp:conf/socialcom/FilippovaFKB12 fatcat:y22oi7txujbcvnyti4bg3g2qse


Paulo Visentini
2015 Austral  
The performance of the democratic authorities in the area of defense had its shades of gray.  ...  of navigation, trade and energy.  ...  Also, trying to be fair to both sides, he defended the right of Israel to exist within secure and internationally recognized borders in front of an organization that still did not recognize this state.  ... 
doi:10.22456/2238-6912.53926 fatcat:egsbj6ak4rcljedxolw266v54i
« Previous Showing results 1 — 15 out of 3,221 results