Sciweavers

1795 search results - page 130 / 359
» Security Models and Information Flow
Sort
View
MM
2004
ACM
106views Multimedia» more  MM 2004»
15 years 9 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
CCS
2007
ACM
15 years 10 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
JSS
2006
118views more  JSS 2006»
15 years 3 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
16 years 5 months ago
Orchid: Integrating Schema Mapping and ETL
This paper describes Orchid, a system that converts declarative mapping specifications into data flow specifications s) and vice versa. Orchid provides an abstract operator model t...
Stefan Dessloch, Mauricio A. Hernández, Rya...
161
Voted
ATAL
2008
Springer
15 years 5 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...