Sciweavers

2699 search results - page 384 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
AI
2010
Springer
14 years 1 months ago
Automatic Discovery of Network Applications: A Hybrid Approach
Automatic discovery of network applications is a very challenging task which has received a lot of attentions due to its importance in many areas such as network security, QoS prov...
Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. ...
CCS
2010
ACM
14 years 5 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
SACMAT
2006
ACM
14 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SOUPS
2010
ACM
14 years 2 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
CCS
2008
ACM
14 years 6 days ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...