Sciweavers

2403 search results - page 88 / 481
» Cyberinsurance in IT Security Management
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
TetherNet Anti-NAT - Secure Internet Subnet Rental System
1 TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT...
Joseph D. Touch, Lars Eggert, Yu-Shun Wang
SIGUCCS
2005
ACM
14 years 3 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 10 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 10 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
WISA
2007
Springer
14 years 4 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang