• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,954
Next 10 →

A Model of Program Execution for Security Purposes

by unknown authors
"... Assurance of software quality and security of computer systems have become dominant concerns in our networking age, to which models of program execution are important. A good model of program execution would allow program execution to be reliably and efficiently identified and verified online. On on ..."
Abstract - Add to MetaCart
formal specification of program execution events for security purposes, and a model of program execution based upon the specification. This paper discusses the program execution model, specifically its background, the formal specification of program execution events with an underlying concept of program

A Sense of Self for Unix Processes

by Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract - Cited by 689 (27 self) - Add to MetaCart
immune systems distinguish self from other. Such "artificial immune systems" would have richer notions of identity and protection than those afforded by current operating systems, and they could provide a layer of general-purpose protection to augment current computer security systems

An intrusion-detection model

by Dorothy E. Denning - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract - Cited by 639 (0 self) - Add to MetaCart
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns

Romantic Love Conceptualized as an Attachment Process,”

by Cindy Hazan , Phillip Shaver , Mary Ainsworth , John Bowlby , Harry Gollob , Kirk-Patrick Lee , Roger Kobak , Anne Peplau , Harry Reis , Judith Schwartz , Ar-Lene Skolnick , Robert Sternberg - Journal of Personality and Social Psychology, , 1987
"... This article explores the possibility that romantic love is an attachment process--a biosocial process by which affectional bonds are formed between adult lovers, just as affectional bonds are formed earlier in life between human infants and their parents. Key components of attachment theory, devel ..."
Abstract - Cited by 729 (18 self) - Add to MetaCart
, developed by Bowlby, Ainsworth, and others to explain the development of affectional bonds in infancy, were translated into terms appropriate to adult romantic love. The translation centered on the three major styles of attachment in infancy--secure, avoidant, and anxious/ambivalent--and on the notion

COUPLING OPF AND TOPOLOGY OPTIMIZATION FOR SECURITY PURPOSES

by Fabrice Zaoui, Stéphane Fliscounakis, Robert Gonzalez
"... Abstract – The paper presents the association of a DC OPF tool with the modeling of topological network states in terms of a linear integer programming optimization process for the N-k static state security. The proposed model is for the help of real-time network operators to ensure the security of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract – The paper presents the association of a DC OPF tool with the modeling of topological network states in terms of a linear integer programming optimization process for the N-k static state security. The proposed model is for the help of real-time network operators to ensure the security

Usability of Display-Equipped RFID Tags for Security Purposes

by Alfred Kobsa, Rishab Nithyan, Gene Tsudik, Ersin Uzun
"... Abstract. The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates man ..."
Abstract - Add to MetaCart
Abstract. The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates

CAPTCHA: Using Hard AI Problems for Security

by Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford - IN PROCEEDINGS OF EUROCRYPT , 2003
"... We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas ..."
Abstract - Cited by 331 (4 self) - Add to MetaCart
have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems

Terra: a virtual machine-based platform for trusted computing

by Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh , 2003
"... We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform, ..."
Abstract - Cited by 431 (5 self) - Add to MetaCart
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy

Can Jannie Verify? Usability of Display-Equipped RFID Tags for Security Purposes

by Alfred Kobsa, Rishab Nithyan, Gene Tsudik, Ersin Uzun , 2012
"... The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult s ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult
Next 10 →
Results 1 - 10 of 8,954
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University