Sciweavers

2270 search results - page 69 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ESORICS
2006
Springer
14 years 12 days ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
CAISE
2000
Springer
14 years 1 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
CSFW
1995
IEEE
14 years 9 days ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
ENTCS
2007
132views more  ENTCS 2007»
13 years 8 months ago
Building Reputations for Internet Clients
We propose a design of a client reputation system that can be used to reduce unwanted traffic in the Internet. Many reputation systems proposed in the trust literature are provid...
Songjie Wei, Jelena Mirkovic
EUROCRYPT
2006
Springer
14 years 12 days ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry