Sciweavers

2272 search results - page 284 / 455
» Provable Data Privacy
Sort
View
118
Voted
ISI
2008
Springer
15 years 2 months ago
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments
We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses ...
Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen
137
Voted
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
15 years 2 months ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...
125
Voted
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 2 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
149
Voted
IWSEC
2010
Springer
15 years 1 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
CSREASAM
2010
15 years 18 days ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...