Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Stuart E. Schechter"'
Autor:
Stuart E. Schechter
Publikováno v:
IEEE Security and Privacy Magazine. 3:40-44
Security risk models have successfully estimated the likelihood of attack for simple security threats such as burglary and auto theft. Before we can forecast the risks to computer systems, we must first learn to measure the strength of their security
Publikováno v:
Computer Networks and ISDN Systems. 30:457-467
Webmasters often use the following rule of thumb to ensure that HTTP server performance does not degrade when traffic is its heaviest — provide twice the server capacity required to handle your site's average load. As a result the server will spend
Publikováno v:
IEEE Symposium on Security and Privacy
We evaluate Website authentication measures that are designed to protect users from man-in-the-middle, 'phishing', and other site forgery attacks. We asked 67 bank customers to conduct common online banking tasks. Each time they logged in, we present
Publikováno v:
Economics of Information Security ISBN: 1402080891
Economics of Information Security
Economics of Information Security
To thwart piracy the entertainment industry must keep distribution costs high, reduce the size of distribution networks, and (if possible) raise the cost of extracting content. However, if ‘trusted computing’ mechanisms deliver on their promises,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::799dcf36f5401954f91ad46e6ae6135b
https://doi.org/10.1007/1-4020-8090-5_5
https://doi.org/10.1007/1-4020-8090-5_5
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540231233
RAID
RAID
Worm detection and response systems must act quickly to identify and quarantine scanning worms, as when left unchecked such worms have been able to infect the majority of vulnerable hosts on the Internet in a matter of minutes [9]. We present a hybri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f877bbd8f19da07e61971bae4113d3c
https://doi.org/10.1007/978-3-540-30143-1_4
https://doi.org/10.1007/978-3-540-30143-1_4
Autor:
Michael D. Smith, Stuart E. Schechter
Publikováno v:
WORM
The damage inflicted by viruses and worms has been limited by the risks that come with the more lucrative payloads. The problem facing authors of self-reproducing malware is that monetizing each intrusion requires the author to risk communication wit
Autor:
Stuart E. Schechter, Michael D. Smith
Publikováno v:
Financial Cryptography ISBN: 9783540406631
We address the question of how much security is required to protect a packaged system, installed in a large number of organizations, from thieves who would exploit a single vulnerability to attack multiple installations. While our work is motivated b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6f4970f5c26f4ecd5bc0c20fc745153c
https://doi.org/10.1007/978-3-540-45126-6_9
https://doi.org/10.1007/978-3-540-45126-6_9
Autor:
Stuart E. Schechter
Publikováno v:
Infrastructure Security ISBN: 9783540443094
Without good testing, systems cannot be made secure or robust. Without metrics for the quality and security of system components, no guarantees can be made about the systems they are used to construct. This paper describes how firms can make the test
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b2001485aa4d63488a3005c4d59db986
https://doi.org/10.1007/3-540-45831-x_6
https://doi.org/10.1007/3-540-45831-x_6
Publikováno v:
Financial Cryptography ISBN: 9783540663621
Financial Cryptography
Financial Cryptography
We present a series of protocols for authenticating an individual's membership in a group without revealing that individual's identity and without restricting how the membership of the group may be changed. In systems using these protocols a single m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::349ea27011371611d24f1508f1dccf07
https://doi.org/10.1007/3-540-48390-x_14
https://doi.org/10.1007/3-540-48390-x_14