Sciweavers

1422 search results - page 217 / 285
» Information security and risk management
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
POLICY
2009
Springer
14 years 3 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 3 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
ACSAC
2006
IEEE
14 years 3 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 2 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu