Sciweavers

5665 search results - page 86 / 1133
» Introduction to Computer Security
Sort
View
EUROMICRO
1999
IEEE
14 years 1 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ICMLA
2003
13 years 10 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
EUROCRYPT
2000
Springer
14 years 16 days ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
CCGRID
2005
IEEE
14 years 2 months ago
Implementing a secure, service oriented accounting system for computational economies
The ability to record and account for the usage of computational resources in a standardised way across different systems from multiple administrative domains is a precursor to wi...
John D. Ainsworth, Jon MacLaren, John M. Brooke