-
2
-
-
84891624492
-
Off by default!
-
November
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. "Off by default!" in Proc. of Fourth Workshop on Hot Topics in Networks (HotNets-IV), November 2005.
-
(2005)
Proc. of Fourth Workshop on Hot Topics in Networks (HotNets-IV)
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
3
-
-
62349114144
-
Paranoid penguin: Introduction to selinux, part ii
-
M. Bauer, "Paranoid penguin: Introduction to selinux, part ii", Linux Journal, vol. 155, 2007.
-
(2007)
Linux Journal
, vol.155
-
-
Bauer, M.1
-
5
-
-
0019009081
-
Formal methods in communication protocol design
-
G. Bochmann and C. Sunshine, "Formal methods in communication protocol design," IEEE Transactions on Communications, vol. 28, no. 4, pp. 624-631, 1980.
-
(1980)
IEEE Transactions on Communications
, vol.28
, Issue.4
, pp. 624-631
-
-
Bochmann, G.1
Sunshine, C.2
-
6
-
-
34548165072
-
Pastures: Towards usable security policy engineering
-
S. Bratus, A. Ferguson, D. McIlroy, and S. Smith, "Pastures: Towards usable security policy engineering," in 2nd International Conference on Availability, Reliability and Security, 2007.
-
(2007)
2nd International Conference on Availability, Reliability and Security
-
-
Bratus, S.1
Ferguson, A.2
McIlroy, D.3
Smith, S.4
-
7
-
-
51849093102
-
Performance analysis of drama: A distributed policy-based system for manet management
-
C.-Y. J. Chiang, S. Demers, P. Gopalakrishnan, L. Kant, A. Poylisher, Y.-H. Cheng, R. Chadha, G. Levin, S. Li, Y. Ling, S. Newman, L. LaVergne, and R. Lo, "Performance analysis of drama: a distributed policy-based system for manet management," in IEEE MILCOM, 2006.
-
(2006)
IEEE MILCOM
-
-
Chiang, C.-Y.J.1
Demers, S.2
Gopalakrishnan, P.3
Kant, L.4
Poylisher, A.5
Cheng, Y.-H.6
Chadha, R.7
Levin, G.8
Li, S.9
Ling, Y.10
Newman, S.11
LaVergne, L.12
Lo, R.13
-
8
-
-
62349118897
-
Threat modelling for mobile ad hoc and sensor networks
-
J. Clark, J. Murdoch, J. McDermid, S. Sen, H. Chivers, O. Worthington, and P. Rohatgi, "Threat modelling for mobile ad hoc and sensor networks," in Annual Conference of ITA, 2007.
-
(2007)
Annual Conference of ITA
-
-
Clark, J.1
Murdoch, J.2
McDermid, J.3
Sen, S.4
Chivers, H.5
Worthington, O.6
Rohatgi, P.7
-
12
-
-
84942257511
-
The strongman architecture
-
A. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, "The strongman architecture," in 3rd DARPA Information Survivability Conference and Exposition, 2003.
-
(2003)
3rd DARPA Information Survivability Conference and Exposition
-
-
Keromytis, A.1
Ioannidis, S.2
Greenwald, M.3
Smith, J.4
-
13
-
-
49049088351
-
Rules of thumb for developing secure software: Analyzing and consolidating two proposed sets of rules
-
H. Peine, "Rules of thumb for developing secure software: Analyzing and consolidating two proposed sets of rules," in 3rd Int. Conf. on Availability, Reliability and Security, 2008.
-
(2008)
3rd Int. Conf. on Availability, Reliability and Security
-
-
Peine, H.1
-
17
-
-
62349102007
-
Vulnerability analysis of policy bootstrapping
-
UMass. Amherst
-
H. Zhang, B. DeCleene, J. Kurose, and D. Towsely, "Vulnerability analysis of policy bootstrapping," in Tec. Report, UMass. Amherst, 2008, ftp://gaia.cs.umass.edu/pub/Zhang08-vulnerability-analysis.pdf.
-
(2008)
Tec. Report
-
-
Zhang, H.1
DeCleene, B.2
Kurose, J.3
Towsely, D.4
-
18
-
-
0842289235
-
Bootstrapping security associations for routing in mobile ad-hoc networks
-
R.B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, "Bootstrapping security associations for routing in mobile ad-hoc networks", in IEEE Globecom, 2003.
-
(2003)
IEEE Globecom
-
-
Bobba, R.B.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
|