Sciweavers

2270 search results - page 380 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
118
Voted
ICARIS
2004
Springer
15 years 9 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
124
Voted
OOPSLA
2004
Springer
15 years 9 months ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...
140
Voted
GI
2003
Springer
15 years 9 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
15 years 7 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
173
Voted
ACSW
2003
15 years 5 months ago
Digital Rights Management for Content Distribution
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...