Sciweavers

5665 search results - page 136 / 1133
» Introduction to Computer Security
Sort
View
CCS
2008
ACM
13 years 11 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
SIGCOMM
2010
ACM
13 years 9 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
ISI
2007
Springer
14 years 3 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
CAISE
2004
Springer
14 years 2 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
GCC
2003
Springer
14 years 2 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li