Sciweavers

1663 search results - page 31 / 333
» Computer Security in the Real World
Sort
View
TGC
2005
Springer
14 years 1 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
13 years 11 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 7 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
ACSAC
2000
IEEE
13 years 12 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
DEXAW
2004
IEEE
88views Database» more  DEXAW 2004»
13 years 11 months ago
A Possible World Approach to Uncertain Relational Data
Data exchange between embedded systems and other small or large computing devices increases. Since data in different data sources may refer to the same real world objects, data ca...
Ander de Keijzer, Maurice van Keulen