Sciweavers

425 search results - page 29 / 85
» Audit
Sort
View
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
14 years 1 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
WWW
2009
ACM
14 years 2 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
IV
2009
IEEE
100views Visualization» more  IV 2009»
14 years 2 months ago
Scouting Requirements Quality Using Visual Representations
Examining the quality of a set of requirements is a sensible project health check given their role in the engineering of quality software systems. However, not all project stakeho...
Orlena Gotel, Francis T. Marchese
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
SAT
2004
Springer
101views Hardware» more  SAT 2004»
14 years 1 months ago
An Algebraic Approach to the Complexity of Generalized Conjunctive Queries
Kolaitis and Vardi pointed out that constraint satisfaction and conjunctive query containment are essentially the same problem. We study the Boolean conjunctive queries under a mor...
Michael Bauland, Philippe Chapdelaine, Nadia Creig...