Sciweavers

5741 search results - page 24 / 1149
» Accessibility in oriented networks
Sort
View
AUSFORENSICS
2003
13 years 9 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 7 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
SOCO
2007
Springer
14 years 1 months ago
Aspect-Oriented Programming: Selecting and Exposing Object Paths
Aspects require access to the join point context in order to select and adapt join points. For this purpose, current aspect-oriented systems offer a large number of pointcut constr...
Mohammed Al-Mansari, Stefan Hanenberg, Rainer Unla...