Security University

Results: 12075



#Item
901

1 Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers Carl A. Gunter University of Illinois

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-03-30 10:34:57
    902Software / Computer architecture / System software / Linux kernel / Computing platforms / Patch / Xen / Dynamic software updating / Hypervisor / NetBSD / Security-Enhanced Linux / Loadable kernel module

    Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:25:04
    903

    Standards for the Acceptable Use of Information Technology Resources The following standards apply to all uses of University information technology resources. These standards are not an exhaustive list of acceptable use,

    Add to Reading List

    Source URL: www.security.mtu.edu

    Language: English - Date: 2011-08-17 09:17:39
      904Crime / Security / Cybercrime / Computer security / Harassment / Criminology / Crime prevention / Identity theft / Victimology / Insurance / International cybercrime

      Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries Working Paper Markus Riek∗, Rainer B¨ohme University of Innsbruck, Department of Computer Science

      Add to Reading List

      Source URL: weis2016.econinfosec.org

      Language: English - Date: 2016-05-18 14:06:08
      905

      Automatic Application Security with Passe Aaron Blankstein and Michael J. Freedman Princeton University Partitioned Web Application Runtime with Constrained Queries Passe Development Cycle

      Add to Reading List

      Source URL: www.princeton.edu

      Language: English - Date: 2013-11-02 22:06:28
        906Computer security / Security / Cyberwarfare / Cybercrime / Computer network security / National security / Hacking / Military technology / Shellcode / Metasploit Project / Security hacker

        William Owen Redwood Contact Information Department of Computer Science The Florida State University

        Add to Reading List

        Source URL: ww2.cs.fsu.edu

        Language: English - Date: 2013-02-18 11:48:25
        907

        Some thoughts on security after ten years of qmail 1.0 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) University of Illinois at Chicago, Chicago, IL 60607–7045, USA

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:08
          908Software engineering / Computer programming / Computing / Edsger W. Dijkstra / Computer security / Control-flow integrity / Subroutines / Control flow / Pointer / DynamoRIO / Goto / Stack

          Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

          Add to Reading List

          Source URL: hexhive.github.io

          Language: English - Date: 2016-06-13 11:08:40
          909Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

          To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2014-07-05 13:33:42
          910

          Intra-Engine Service Security for Grids Based on WSRF Matthew Smith, Thomas Friese, Bernd Freisleben Dept. of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str, 35032 Marburg, Germany Email: {matt

          Add to Reading List

          Source URL: www.dcsec.uni-hannover.de

          Language: English - Date: 2010-11-03 12:17:51
            UPDATE