Sciweavers

3149 search results - page 179 / 630
» IT security risk management
Sort
View
CCS
2006
ACM
14 years 1 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
CDES
2006
62views Hardware» more  CDES 2006»
13 years 10 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 1 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 3 months ago
A Memory Unit for Priority Management in IPSec Accelerators
— This paper introduces a hardware architecture for high speed network processors, focusing on support for Quality of Service in IPSec-dedicated systems. The effort is aimed at d...
Luigi Dadda, Alberto Ferrante, Marco Macchetti
ISI
2006
Springer
13 years 9 months ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia