Sciweavers

334 search results - page 39 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICAC
2009
IEEE
14 years 2 months ago
Self-correlating predictive information tracking for large-scale production systems
Automatic management of large-scale production systems requires a continuous monitoring service to keep track of the states of the managed system. However, it is challenging to ac...
Ying Zhao, Yongmin Tan, Zhenhuan Gong, Xiaohui Gu,...
POLICY
2001
Springer
14 years 11 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
CSCW
2004
ACM
14 years 1 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
ICC
2008
IEEE
138views Communications» more  ICC 2008»
14 years 2 months ago
Designing File Replication Schemes for Peer-to-Peer File Sharing Systems
—Peer-to-peer (P2P) file sharing systems are becoming increasingly popular due to their flexibility and scalability. We propose a new model to design file replication schemes ...
Jian Ni, Jie Lin, S. J. Harrington, Naveen Sharma