Sciweavers

2403 search results - page 43 / 481
» Cyberinsurance in IT Security Management
Sort
View
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 3 months ago
A Memory Unit for Priority Management in IPSec Accelerators
— This paper introduces a hardware architecture for high speed network processors, focusing on support for Quality of Service in IPSec-dedicated systems. The effort is aimed at d...
Luigi Dadda, Alberto Ferrante, Marco Macchetti
FAST
2009
13 years 7 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
IDTRUST
2009
ACM
14 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
CCS
2007
ACM
14 years 3 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 2 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao