Sciweavers

370 search results - page 45 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
102
Voted
CNIS
2006
15 years 4 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller
127
Voted
SAJ
2002
97views more  SAJ 2002»
15 years 2 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
130
Voted
IFIP
2007
Springer
15 years 8 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
129
Voted
CCS
2000
ACM
15 years 7 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
102
Voted
EDBT
2008
ACM
129views Database» more  EDBT 2008»
16 years 2 months ago
Design of PriServ, a privacy service for DHTs
By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data ...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...