Search For:

Displaying 1-3 out of 3 total
Lost Treasures
Found in: IEEE Security & Privacy
By Dan Thomsen,Jeremy Epstein,Peter G. Neumann
Issue Date:November 2012
pp. 17-19
Is the computer security field really old enough to have lost treasures? Will a granite punch card with ancient Cobol contain some code fragment that produces a better firewall? Hardly. The computing environment changes so much and so radically that implem...
FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats
Found in: Self-Adaptive and Self-Organizing Systems Workshops, IEEE International Conference on
By David J. Musliner,Jeffrey M. Rye,Dan Thomsen,David D. McDonald,Mark H. Burstein,Paul Robertson
Issue Date:October 2011
pp. 137-140
Today's computer systems are under relentless attack from cyber attackers armed with sophisticated vulnerability search and exploit development toolkits. To protect against such threats, we are developing FUZZBUSTER, an automated system that provides adapt...
Patterns in Security Enforcement Policy Development
Found in: Database and Expert Systems Applications, International Workshop on
By Dan Thomsen
Issue Date:September 2007
pp. 744-748
Creating security enforcement policies is a complex design problem that is often done using a native GUI. A security policy for an enterprise must span native applications and be expressed in a format that best captures design problems. This paper looks at...