Sciweavers

171 search results - page 19 / 35
» Securing Provenance-Based Audits
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CHI
2010
ACM
14 years 2 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
WAIM
2005
Springer
14 years 1 months ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
EUROPKI
2007
Springer
13 years 11 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
SE
2008
13 years 9 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz