Sciweavers

12637 search results - page 152 / 2528
» Security for Extensible Systems
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 27 days ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 4 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
DSN
2007
IEEE
14 years 3 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
CCS
2004
ACM
14 years 2 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...