Sciweavers

1875 search results - page 39 / 375
» Modeling the Security of Steganographic Systems
Sort
View
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
14 years 3 months ago
Using Aspects to Design a Secure System
Developers of complex systems have to address concerns such as security, availability of services, and timeliness that often are non-orthogonal to traditional design structures, t...
Geri Georg, Indrakshi Ray, Robert B. France
ISMIS
2005
Springer
14 years 4 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ISORC
2005
IEEE
14 years 4 months ago
Adaptable Situation-Aware Secure Service-Based (AS3) Systems
Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 6 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
FUIN
2008
103views more  FUIN 2008»
13 years 11 months ago
LDYIS: a Framework for Model Checking Security Protocols
We present a formalism for the automatic verification of security protocols based on multi-agent systems semantics. We give the syntax and semantics of a temporal-epistemic securit...
Alessio Lomuscio, Wojciech Penczek