Sciweavers

253 search results - page 43 / 51
» Provisions and Obligations in Policy Management and Security...
Sort
View
DIM
2007
ACM
13 years 11 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 1 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
ENTCS
2008
79views more  ENTCS 2008»
13 years 7 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...
ICCS
2007
Springer
14 years 1 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...