Sciweavers

12637 search results - page 96 / 2528
» Security for Extensible Systems
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
WER
2007
Springer
14 years 3 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
CAISE
1998
Springer
14 years 1 months ago
OMS/Java: Model Extensibility of OODBMS for Advanced Application Domains
We show how model extensibility of object-oriented data management systems can be achieved through the combination of a highlevel core object data model and an architecture designe...
Andreas Steiner, Adrian Kobler, Moira C. Norrie
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 3 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu