Sciweavers

425 search results - page 37 / 85
» Audit
Sort
View
ANCS
2007
ACM
13 years 11 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
ACSAC
2001
IEEE
13 years 11 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
NIPS
1990
13 years 8 months ago
A Delay-Line Based Motion Detection Chip
Inspired by a visual motion detection model for the rabbit retina and by a computational architecture used for early audition in the barn owl, we have designed a chip that employs...
Timothy K. Horiuchi, John Lazzaro, Andrew Moore, C...
CSE
2009
IEEE
13 years 8 months ago
Integrity Verification of Outsourced XML Databases
Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verificat...
Ruilin Liu, Hui Wang
WOTE
2010
13 years 6 months ago
Aperio: High Integrity Elections for Developing Countries
This article presents an ‘end-to-end’ integrity verification mechanism for use in minimally equipped secret paper-ballot election environments. The scheme presented in this pa...
Aleksander Essex, Jeremy Clark, Carlisle Adams