enter search term and/or author name
Simple, state-based approaches to program-based anomaly detection
C. C. Michael, Anup Ghosh
This article describes variants of two state-based intrusion detection algorithms from Michael and Ghosh  and Ghosh et al. , and gives experimental results on their performance. The algorithms detect anomalies in execution audit data. One...
Token-based scanning of source code for security problems
John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
We describe ITS4, a tool for statically scanning C and C++ source code for security vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ground between accuracy and efficiency. This method is efficient...
Information leakage from optical emanations
Joe Loughry, David A. Umphress
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information...
Secure and selective dissemination of XML documents
Elisa Bertino, Elena Ferrari
XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively...
A graph-based formalism for RBAC
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of products. This article presents a formalization of RBAC using graph transformations that is a graphical specification technique based on a...