Sciweavers

236 search results - page 17 / 48
» Firewall Security: Policies, Testing and Performance Evaluat...
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 8 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
ICCBR
2003
Springer
14 years 28 days ago
Evaluation of Case-Based Maintenance Strategies in Software Design
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 16 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
WPES
2003
ACM
14 years 29 days ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng