Sciweavers

848 search results - page 23 / 170
» Secure Information Flow for Distributed Systems
Sort
View
ESORICS
2003
Springer
13 years 12 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
FTDCS
1997
IEEE
13 years 11 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
ACSAC
1998
IEEE
13 years 11 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ISPDC
2006
IEEE
14 years 23 days ago
Managing Information and Time Flow in an Agent-Based E-Commerce System
Recently, we have proposed a comprehensive agent-based e-commerce system. While UML formalized, it lacked details how basic functions – e.g. user request to purchase a given pro...
Maciej Gawinecki, Maria Ganzha, Pawel Kobzdej, Mar...