Results 1 - 10
of
11,551
Security Program”
, 2015
"... Establishes the responsibilities and procedures for granting deviations to the DoD Physical Security Program as outlined in DoD Instruction (DoDI) ..."
Abstract
- Add to MetaCart
Establishes the responsibilities and procedures for granting deviations to the DoD Physical Security Program as outlined in DoD Instruction (DoDI)
Security Program”
, 2014
"... Establishes the responsibilities and procedures for granting deviations to the DoD Physical Security Program as outlined in DoD Instruction (DoDI) ..."
Abstract
- Add to MetaCart
Establishes the responsibilities and procedures for granting deviations to the DoD Physical Security Program as outlined in DoD Instruction (DoDI)
Certification of Programs for Secure Information Flow
, 1977
"... This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing c ..."
Abstract
-
Cited by 490 (1 self)
- Add to MetaCart
This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing
Secure Program Partitioning
, 2001
"... This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untrusted hosts. Confidentiality and integrity policies can be expressed by annotating programs with security types that constr ..."
Abstract
-
Cited by 82 (20 self)
- Add to MetaCart
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untrusted hosts. Confidentiality and integrity policies can be expressed by annotating programs with security types
A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS
, 1996
"... Ensuring secure information ow within programs in the context of multiple sensitivity levels has been widely studied. Especially noteworthy is Denning's work in secure ow analysis and the lattice model [6][7]. Until now, however, the soundness of Denning's analysis has not been established ..."
Abstract
-
Cited by 540 (21 self)
- Add to MetaCart
Ensuring secure information ow within programs in the context of multiple sensitivity levels has been widely studied. Especially noteworthy is Denning's work in secure ow analysis and the lattice model [6][7]. Until now, however, the soundness of Denning's analysis has not been
Secure Program Execution via Dynamic Information Flow Tracking
, 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract
-
Cited by 271 (3 self)
- Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control
Social Security Programs and Retirement Around the World
, 2004
"... In almost every industrialized country the population is aging rapidly and individuals are living longer. These demographic trends have placed enormous pressure on the financial viability of the social security systems in these countries. The financial pressure is compounded by another trend. In vir ..."
Abstract
-
Cited by 197 (5 self)
- Add to MetaCart
In almost every industrialized country the population is aging rapidly and individuals are living longer. These demographic trends have placed enormous pressure on the financial viability of the social security systems in these countries. The financial pressure is compounded by another trend
A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract
-
Cited by 462 (7 self)
- Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls
Why Johnny can’t encrypt: A usability evaluation of PGP 5.0
, 1999
"... User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective secu ..."
Abstract
-
Cited by 479 (4 self)
- Add to MetaCart
security requires a different usability standard, and that it will not be achieved through the user interface design techniques appropriate to other types of consumer software. To test this hypothesis, we performed a case study of a security program which does have a good user interface by general
A Sense of Self for Unix Processes
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract
-
Cited by 689 (27 self)
- Add to MetaCart
intrusions involving sendmail and lpr. This work is part of a research program aimed at building computer security systems that incorporate the mechanisms and algorithms used by natural immune systems. 1 Introduction We are interested in developing computer security methods that are based on the way natural
Results 1 - 10
of
11,551