Sciweavers

2517 search results - page 386 / 504
» Secure Deployment of Components
Sort
View
SUTC
2006
IEEE
14 years 3 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
ICDCS
2005
IEEE
14 years 2 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
ICDCSW
2005
IEEE
14 years 2 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
ISI
2005
Springer
14 years 2 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...