Sciweavers

1949 search results - page 274 / 390
» Protective Interface Specifications
Sort
View
132
Voted
LADC
2007
Springer
15 years 8 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
146
Voted
ANCS
2006
ACM
15 years 8 months ago
Advanced algorithms for fast and scalable deep packet inspection
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic Finite Automata (DFA) are commonly used...
Sailesh Kumar, Jonathan S. Turner, John Williams
152
Voted
SOUPS
2006
ACM
15 years 8 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
114
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICC
2000
IEEE
124views Communications» more  ICC 2000»
15 years 7 months ago
A Fair Traffic Conditioner for the Assured Service in a Differentiated Services Internet
— A research issue under investigation in the context of differentiated services (DiffServ) is the fair distribution of bandwidth between aggregates sharing the same Assured Forw...
Ilias Andrikopoulos, Lloyd Wood, George Pavlou