Sciweavers

315 search results - page 60 / 63
» Arrows for secure information flow
Sort
View
129
Voted
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 7 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
151
Voted
IAT
2007
IEEE
15 years 10 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
136
Voted
MKWI
2008
160views Business» more  MKWI 2008»
15 years 5 months ago
Architectural Design of Flexible Process Management Technology
: To provide effective support, process-aware information systems (PAIS) must not freeze existing business processes. Instead they should enable authorized users to deviate on-the-...
Manfred Reichert, Peter Dadam, Martin Jurisch, Ulr...
124
Voted
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 3 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
133
Voted
ICON
2007
IEEE
15 years 10 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...