Sciweavers

947 search results - page 164 / 190
» Information Security in Mobile Databases
Sort
View
SACMAT
2005
ACM
14 years 4 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
NDSS
1998
IEEE
14 years 3 months ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young
CCS
1994
ACM
14 years 3 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
ACSAC
2001
IEEE
14 years 2 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
BIOSURVEILLANCE
2008
Springer
14 years 28 days ago
Integrating a Commuting Model with the Bayesian Aerosol Release Detector
The Bayesian Aerosol Release Detector (BARD) is a biosurveillance system for detecting and characterizing disease outbreaks caused by aerosol releases of anthrax. A major challenge...
Aurel Cami, Garrick L. Wallstrom, William R. Hogan