Results 1 - 10
of
8,954
A Model of Program Execution for Security Purposes
"... Assurance of software quality and security of computer systems have become dominant concerns in our networking age, to which models of program execution are important. A good model of program execution would allow program execution to be reliably and efficiently identified and verified online. On on ..."
Abstract
- Add to MetaCart
formal specification of program execution events for security purposes, and a model of program execution based upon the specification. This paper discusses the program execution model, specifically its background, the formal specification of program execution events with an underlying concept of program
A Sense of Self for Unix Processes
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract
-
Cited by 689 (27 self)
- Add to MetaCart
immune systems distinguish self from other. Such "artificial immune systems" would have richer notions of identity and protection than those afforded by current operating systems, and they could provide a layer of general-purpose protection to augment current computer security systems
An intrusion-detection model
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract
-
Cited by 639 (0 self)
- Add to MetaCart
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns
Romantic Love Conceptualized as an Attachment Process,”
- Journal of Personality and Social Psychology,
, 1987
"... This article explores the possibility that romantic love is an attachment process--a biosocial process by which affectional bonds are formed between adult lovers, just as affectional bonds are formed earlier in life between human infants and their parents. Key components of attachment theory, devel ..."
Abstract
-
Cited by 729 (18 self)
- Add to MetaCart
, developed by Bowlby, Ainsworth, and others to explain the development of affectional bonds in infancy, were translated into terms appropriate to adult romantic love. The translation centered on the three major styles of attachment in infancy--secure, avoidant, and anxious/ambivalent--and on the notion
COUPLING OPF AND TOPOLOGY OPTIMIZATION FOR SECURITY PURPOSES
"... Abstract – The paper presents the association of a DC OPF tool with the modeling of topological network states in terms of a linear integer programming optimization process for the N-k static state security. The proposed model is for the help of real-time network operators to ensure the security of ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract – The paper presents the association of a DC OPF tool with the modeling of topological network states in terms of a linear integer programming optimization process for the N-k static state security. The proposed model is for the help of real-time network operators to ensure the security
Usability of Display-Equipped RFID Tags for Security Purposes
"... Abstract. The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates man ..."
Abstract
- Add to MetaCart
Abstract. The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates
CAPTCHA: Using Hard AI Problems for Security
- IN PROCEEDINGS OF EUROCRYPT
, 2003
"... We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas ..."
Abstract
-
Cited by 331 (4 self)
- Add to MetaCart
have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems
Terra: a virtual machine-based platform for trusted computing
, 2003
"... We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform, ..."
Abstract
-
Cited by 431 (5 self)
- Add to MetaCart
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform
Collusion-Secure Fingerprinting for Digital Data
- IEEE Transactions on Information Theory
, 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract
-
Cited by 353 (1 self)
- Add to MetaCart
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy
Can Jannie Verify? Usability of Display-Equipped RFID Tags for Security Purposes
, 2012
"... The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult s ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult
Results 1 - 10
of
8,954