Sciweavers

1186 search results - page 9 / 238
» A New Approach to Secure Logging
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ACSAC
1998
IEEE
14 years 21 days ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
EAGC
2003
Springer
14 years 1 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...
SP
2007
IEEE
14 years 2 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
CSMR
2002
IEEE
14 years 1 months ago
A New Approach to Software Exploration: Back-Packing with GSEE
Maintaining software is very difficult, not only because of the number of software artifacts, but also because of the large variety of artifacts. Software includes programs, but a...
Jean-Marie Favre