Sciweavers

14 search results - page 2 / 3
» Protection in the Guide Object-Oriented Distributed System
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ECOOPW
1999
Springer
14 years 27 days ago
Tool Support for Refactoring Duplicated OO Code
Code duplication is an important problem in application maintenance. Tools exist that support code duplication detection. However, few of them propose a solution for the problem, ...
Matthias Rieger, Stéphane Ducasse, Georges ...
CCS
2005
ACM
14 years 2 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
SAC
2006
ACM
13 years 8 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
DBSEC
2003
140views Database» more  DBSEC 2003»
13 years 10 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica