Sciweavers

561 search results - page 65 / 113
» Remote Access Security Issues
Sort
View
CCS
2004
ACM
14 years 4 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 11 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
ICCSA
2005
Springer
14 years 4 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
DEON
2008
Springer
14 years 22 days ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ESWS
2010
Springer
13 years 9 months ago
DSMW: Distributed Semantic MediaWiki
DSMW is an extension to Semantic Mediawiki (SMW), it allows to create a network of SMW servers that share common semantic wiki pages. DSMW users can create communication channels b...
Hala Skaf-Molli, Gérôme Canals, Pasca...