Sciweavers

341 search results - page 26 / 69
» A Security Engineering Process based on Patterns
Sort
View
99
Voted
COMPUTER
2004
79views more  COMPUTER 2004»
15 years 2 months ago
Extending the Reach of Business Processes
partners are abstracted as Web services, we have introduced additional constructs to represent human users and define human interaction patterns. Each business process defined in o...
Dipanjan Chakraborty, Hui Lei
AINA
2008
IEEE
15 years 9 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su
117
Voted
ICPP
2006
IEEE
15 years 8 months ago
Data Sharing Pattern Aware Scheduling on Grids
These days an increasing number of applications, especially in science and engineering, are dealing with a massive amount of data; hence they are dataintensive. Bioinformatics, da...
Young Choon Lee, Albert Y. Zomaya
ICNP
2006
IEEE
15 years 8 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
128
Voted
ICASSP
2010
IEEE
15 years 1 months ago
Sectored Random Projections for Cancelable Iris Biometrics
Privacy and security are essential requirements in practical biometric systems. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable...
Jaishanker K. Pillai, Vishal M. Patel, Rama Chella...