Sciweavers

115 search results - page 16 / 23
» Infrastructure: A Prerequisite for Effective Security
Sort
View
ICC
2007
IEEE
122views Communications» more  ICC 2007»
14 years 2 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
ACSAC
2005
IEEE
14 years 2 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
ACSAC
2000
IEEE
14 years 1 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
ECOOPW
1998
Springer
14 years 19 days ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
DEXAW
2007
IEEE
113views Database» more  DEXAW 2007»
14 years 16 days ago
A new domain-based payment model for emerging mobile commerce scenarios
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Diego Suarez, Joaquín Torres Márquez...