Sciweavers

595 search results - page 64 / 119
» New architecture for intra-domain network security issues
Sort
View
RAID
2010
Springer
13 years 7 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
APCSAC
2001
IEEE
14 years 12 days ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 2 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SKG
2006
IEEE
14 years 2 months ago
A Knowledge Grid Architecture Based on Mobile Agent
The performance of services implemented in the serviceoriented knowledge grid becomes one of the most key issues that affect the development of the knowledge grid. This paper pres...
Gang Wang, Tao Wen, Quan Guo, Xuebin Ma