Sciweavers

3305 search results - page 183 / 661
» Can we Rely on SQL
Sort
View
DEXAW
2006
IEEE
151views Database» more  DEXAW 2006»
14 years 4 months ago
Avenues to Flexible Data Integrity Checking
Traditional methods for integrity checking in relational or deductive databases heavily rely on the assumption that data have integrity before the execution of updates. In this wa...
Hendrik Decker, Davide Martinenghi
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 4 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
MOBICOM
2006
ACM
14 years 4 months ago
Increasing broadcast reliability in vehicular ad hoc networks
Broadcast transmissions are the predominate form of network traffic in a VANET. However, since there is no MAC-layer recovery on broadcast frames within an 802.11-based VANET, th...
Nathan Balon, Jinhua Guo
ACSC
2005
IEEE
14 years 4 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 4 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel