Sciweavers

161 search results - page 20 / 33
» Secure Databases: An Analysis of Clark-Wilson Model in a Dat...
Sort
View
KBSE
2005
IEEE
14 years 29 days ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
IDEAS
2007
IEEE
135views Database» more  IDEAS 2007»
14 years 1 months ago
Bitmap Index Design Choices and Their Performance Implications
Historically, bitmap indexing has provided an important database capability to accelerate queries. However, only a few database systems have implemented these indexes because of t...
Elizabeth J. O'Neil, Patrick E. O'Neil, Kesheng Wu
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 7 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
BMCBI
2007
203views more  BMCBI 2007»
13 years 7 months ago
A Grid-based solution for management and analysis of microarrays in distributed experiments
Several systems have been presented in the last years in order to manage the complexity of large microarray experiments. Although good results have been achieved, most systems ten...
Ivan Porro, Livia Torterolo, Luca Corradi, Marco F...