NSPW C

19 papers

YearTitle / Authors
2005"Diversity as a computer defense mechanism".
Bev Littlewood
2005Average case vs. worst case: margins of safety in system design.
Christian W. Probst, Andreas Gal, Michael Franz
2005Diversity as a computer defense mechanism.
Carol Taylor, Jim Alves-Foss
2005Diversity: the biological perspective position statement.
Carol Taylor
2005Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Ivan Flechais, Jens Riegelsberger, Martina Angela Sasse
2005Empirical privilege profiling.
Carla Marceau, Robert A. Joyce
2005Flooding and recycling authorizations.
Konstantin Beznosov
2005Internet instability and disturbance: goal or menace?
Richard Ford, Mark Bush, Alex Boulatov
2005Message authentication by integrity with public corroboration.
Paul C. van Oorschot
2005Pass-thoughts: authenticating with our minds.
Julie Thorpe, Paul C. van Oorschot, Anil Somayaji
2005Position paper.
Irene Schwarting
2005Position: "insider" is relative.
Matt Bishop
2005Principles-driven forensic analysis.
Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo
2005Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005
Simon N. Foley
2005Software diversity:
John McHugh
2005Speculative virtual verification: policy-constrained speculative execution.
Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
2005The insider problem revisited.
Matt Bishop
2005Use of diversity as a defense mechanism.
Roy A. Maxion
2005Visual security protocol modeling.
John P. McDermott