Sciweavers

434 search results - page 25 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
CCS
2010
ACM
13 years 9 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
SOSP
2007
ACM
14 years 5 months ago
Integrating concurrency control and energy management in device drivers
Energy management is a critical concern in wireless sensornets. Despite its importance, sensor network operating systems today provide minimal energy management support, requiring...
Kevin Klues, Vlado Handziski, Chenyang Lu, Adam Wo...
ASWEC
2008
IEEE
14 years 3 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
DOLAP
2000
ACM
14 years 1 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul