Sciweavers

61 search results - page 8 / 13
» Reliable Process for Security Policy Deployment
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten
AVSS
2007
IEEE
14 years 1 months ago
2D face pose normalisation using a 3D morphable model
The ever growing need for improved security, surveillance and identity protection, calls for the creation of evermore reliable and robust face recognition technology that is scala...
Jose Rafael Tena, Raymond S. Smith, Miroslav Hamou...
AVSS
2008
IEEE
13 years 7 months ago
Multi-view Access Monitoring and Singularization in Interlocks
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...
ESORICS
2004
Springer
14 years 26 days ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
ACSAC
2002
IEEE
14 years 13 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...