Sciweavers

314 search results - page 47 / 63
» ITOSS: An Integrated Toolkit For Operating System Security
Sort
View
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 10 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
SADFE
2008
IEEE
14 years 3 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
ASPLOS
2006
ACM
14 years 2 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
BIOSIG
2003
117views Biometrics» more  BIOSIG 2003»
13 years 10 months ago
Comparative Study on Fingerprint Recognition Systems - Project BioFinger
: This paper describes a comparative study on fingerprint recognition systems – the project BioFinger. The goal of this study is to investigate the capability characteristics of ...
Michael Arnold, Henning Daum, Christoph Busch
ICETE
2004
204views Business» more  ICETE 2004»
13 years 10 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson