-
2
-
-
70450286023
-
Marine base seeks missing laptop
-
Oct
-
Marine base seeks missing laptop. Associated Press, Oct 2006.
-
(2006)
Associated Press
-
-
-
4
-
-
0027764777
-
A cryptographic file system for UNIX
-
Nov
-
M. Blaze. A cryptographic file system for UNIX. In Proc. CCS, pages 9-16, Nov 1993.
-
(1993)
Proc. CCS
, pp. 9-16
-
-
Blaze, M.1
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Mar
-
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proc. INFOCOM, pages 1917-1928, Mar 2005.
-
(2005)
Proc. INFOCOM
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
6
-
-
33144454801
-
Secure positioning in wireless networks
-
Feb
-
S. Capkun and J.-P. Hubaux. Secure positioning in wireless networks. JSAC, 24(2):221-232, Feb 2006.
-
(2006)
JSAC
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.-P.2
-
7
-
-
70450266273
-
-
Cisco Systems. Cisco Network Admission Control (NAC) solution executive overview. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns466/c654/ cdccont-0900aecd80557152.pdf, 2006. Visited 2007/5/4.
-
Cisco Systems. Cisco Network Admission Control (NAC) solution executive overview. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns466/c654/ cdccont-0900aecd80557152.pdf, 2006. Visited 2007/5/4.
-
-
-
-
8
-
-
0036949148
-
Zero-Interaction Authentication
-
Sep
-
M. D. Corner and B. D. Noble. Zero-Interaction Authentication. In Proc. MOBICOM, pages 1-11, Sep 2002.
-
(2002)
Proc. MOBICOM
, pp. 1-11
-
-
Corner, M.D.1
Noble, B.D.2
-
9
-
-
0035791053
-
Securing context-aware applications using environment roles
-
May
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Proc. Symposium on Access Control Models and Technologies, pages 10-20, May 2001.
-
(2001)
Proc. Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
10
-
-
84944048132
-
The Ponder policy specification language
-
Proc. Policies for Distributed Systems and Networks, Jan
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In Proc. Policies for Distributed Systems and Networks, LNCS, pages 18-39, Jan 2001.
-
(2001)
LNCS
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
11
-
-
70450250870
-
-
M. Dornseif, M. Becker, and C. N. Klein. FireWire: All of your memory are belong to us. http://md.hudora.de/presentations/firewire/2005-firewire- cansecwest.pdf, May 2005. Visited 2007/5/4.
-
M. Dornseif, M. Becker, and C. N. Klein. FireWire: All of your memory are belong to us. http://md.hudora.de/presentations/firewire/2005-firewire- cansecwest.pdf, May 2005. Visited 2007/5/4.
-
-
-
-
12
-
-
70450249212
-
Posture-Based Data Protection
-
Technical report, PARC, 2007
-
G. Durfee, D. K. Smetters, and D. Balfanz. Posture-Based Data Protection. Technical report, PARC, 2007.
-
-
-
Durfee, G.1
Smetters, D.K.2
Balfanz, D.3
-
13
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
Oct
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. SOSP, pages 17-30, Oct 2005.
-
(2005)
Proc. SOSP
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
14
-
-
70450240366
-
WiFi nomads and their unprotected devices: The case for Quarantine, Examination, and Decontamination
-
Aug
-
K. Eustice, V. Ramakrishna, S. Markstrum, P. Reiher, and G. Popek. WiFi nomads and their unprotected devices: The case for Quarantine, Examination, and Decontamination. In Proc. NSPW, pages 123-128, Aug 2003.
-
(2003)
Proc. NSPW
, pp. 123-128
-
-
Eustice, K.1
Ramakrishna, V.2
Markstrum, S.3
Reiher, P.4
Popek, G.5
-
15
-
-
33947635594
-
Loud and Clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and Clear: Human-verifiable authentication based on audio. In Proc. International Conference on Distributed Computing Systems, pages 10-17, 2006.
-
(2006)
Proc. International Conference on Distributed Computing Systems
, pp. 10-17
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
16
-
-
70450268222
-
-
Infosecurity Europe. Two thirds of workers reveal passwords for chocolate and a pretty smile. http://www.infosec.co.uk/page.cfm/Action=Press/PressID=640, Apr 2007. Visited 2007/5/4.
-
Infosecurity Europe. Two thirds of workers reveal passwords for chocolate and a pretty smile. http://www.infosec.co.uk/page.cfm/Action=Press/PressID=640, Apr 2007. Visited 2007/5/4.
-
-
-
-
17
-
-
70450249213
-
Afghan market sells US military flash drives
-
Apr
-
J. Leyden. Afghan market sells US military flash drives. The Register, Apr 2006.
-
(2006)
The Register
-
-
Leyden, J.1
-
18
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
Oct
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah. First experiences using XACML for access control in distributed systems. In Proc. Workshop on XML Security, pages 25-37, Oct 2003.
-
(2003)
Proc. Workshop on XML Security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
19
-
-
79957608179
-
-
McAfee. Data Loss Prevention. http://www.mcafee.com/us/enterprise/ products/data-loss-prevention/. Visited 2007/10/29.
-
Data Loss Prevention
-
-
-
20
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
May
-
J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. Symposium on Security and Privacy, pages 110-124, May 2005.
-
(2005)
Proc. Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
22
-
-
70450228109
-
The Autokey security architecture, protocol and algorithms
-
Technical Report 06-1-1, University of Delaware Electrical and Computer Engineering, January
-
D. L. Mills. The Autokey security architecture, protocol and algorithms. Technical Report 06-1-1, University of Delaware Electrical and Computer Engineering, January 2006.
-
(2006)
-
-
Mills, D.L.1
-
24
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
January
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. POPL, pages 228-241, January 1999.
-
(1999)
Proc. POPL
, pp. 228-241
-
-
Myers, A.C.1
-
25
-
-
33845953872
-
-
National Security Agency
-
National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/ selinux/. Visited 2007/5/4.
-
Security-Enhanced Linux
-
-
-
27
-
-
84869674864
-
-
Reconnex. http://www.reconnnex.net/. Visited 2007/10/29.
-
Reconnex
-
-
-
28
-
-
70450234263
-
Boeing laptop with data on 382,000 employees stolen
-
Dec
-
L. Rosencrance. Boeing laptop with data on 382,000 employees stolen. Computerworld, Dec 2006.
-
(2006)
Computerworld
-
-
Rosencrance, L.1
-
29
-
-
0016555241
-
The protection of information in computer systems
-
Sep
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. of the IEEE, 63(9):1278-1308, Sep 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
30
-
-
70450259382
-
FBI eyes contractor in Los Alamos leak
-
Oct
-
J. Seper. FBI eyes contractor in Los Alamos leak. The Washington Times, Oct 2006.
-
(2006)
The Washington Times
-
-
Seper, J.1
-
31
-
-
84947251443
-
-
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. International Workshop on Security Protocols, LNCS, pages 172-182, 1999.
-
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. International Workshop on Security Protocols, LNCS, pages 172-182, 1999.
-
-
-
-
32
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. Architectural Support for Programming Languages and Operating Systems, pages 85-96, Oct 2004.
-
(2004)
Proc. Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
33
-
-
84869682430
-
-
Trusted Computing Group
-
Trusted Computing Group. https://www.trustedcomputinggroup.org/. Visited 2007/5/4.
-
-
-
-
34
-
-
84869684409
-
-
Verdasys. Digital Guardian. http://www.verdasys.com/digital-guardian.php. Visited 2007/10/29.
-
Digital Guardian
-
-
-
35
-
-
84869667815
-
-
Vontu. http://www.vontu.com/. Visited 2007/10/29.
-
Vontu
-
-
-
36
-
-
0026483978
-
The Active Badge location system
-
Jan
-
R. Want, A. Hopper, V. Falcão, and J. Gibbons. The Active Badge location system. Transactions on Information Systems, 10(1):91-102, Jan 1992.
-
(1992)
Transactions on Information Systems
, vol.10
, Issue.1
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Falcão, V.3
Gibbons, J.4
-
37
-
-
84869673974
-
-
Websense. Content Protection Suite. http://www.websense.com/global/en/ ProductsServices/CPS/. Visited 2007/10/29.
-
Content Protection Suite
-
-
-
38
-
-
70450256503
-
-
R.-P. Weinman and J. Appelbaum. Unlocking FileVault: An analysis of Apple's disk encryption system. http://events.ccc.de/congress/2006/Fahrplan/ attachments/1244-23C3VileFault.pdf, Dec 2006. Visited 2007/5/4.
-
R.-P. Weinman and J. Appelbaum. Unlocking FileVault: An analysis of Apple's disk encryption system. http://events.ccc.de/congress/2006/Fahrplan/ attachments/1244-23C3VileFault.pdf, Dec 2006. Visited 2007/5/4.
-
-
-
-
39
-
-
84948183524
-
Cryptographic file systems performance: What you don't know can hurt you
-
Oct
-
C. P. Wright, J. Dave, and E. Zadok. Cryptographic file systems performance: What you don't know can hurt you. In Proc. Security in Storage Workshop, pages 47+, Oct 2003.
-
(2003)
Proc. Security in Storage Workshop
-
-
Wright, C.P.1
Dave, J.2
Zadok, E.3
-
40
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
August
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proc. USENIX Security, pages 121-136, August 2006.
-
(2006)
Proc. USENIX Security
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|