Sciweavers

781 search results - page 105 / 157
» An Integrated Model for Hybrid Securities
Sort
View
ESORICS
1994
Springer
14 years 24 days ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 8 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
ACSAC
2010
IEEE
13 years 6 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
CCS
2007
ACM
14 years 2 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
ICCV
2011
IEEE
12 years 8 months ago
Video Primal Sketch: A Generic Middle-Level Representation of Video
This paper presents a middle-level video representation named Video Primal Sketch (VPS), which integrates two regimes of models: i) sparse coding model using static or moving prim...
Zhi Han, Zongben Xu, Song-Chun Zhu