Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Web services technologies change the software industry drastically by developing and integrating enterprise web services and applications in order to enable the users to access th...
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald...
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...