Sciweavers

425 search results - page 44 / 85
» Audit
Sort
View
RAID
1999
Springer
13 years 12 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
WETICE
1998
IEEE
13 years 12 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
ACSAC
1997
IEEE
13 years 12 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
13 years 11 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
VISUALIZATION
1993
IEEE
13 years 11 months ago
GRASPARC: A Problem Solving Environment Integrating Computation and Visualization
Visualization has proved an e ective tool in the understanding of large data sets in computational science and engineering. There is growing interest today in the development of p...
Ken Brodlie, A. Poon, Helen Wright, L. Brankin, G....