Sciweavers

2337 search results - page 352 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
DRM
2004
Springer
14 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
CCS
2003
ACM
14 years 2 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
PASTE
2005
ACM
14 years 2 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 11 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
WWW
2001
ACM
14 years 9 months ago
LiteMinutes: an Internet-based system for multimedia meeting minutes
The Internet provides a highly suitable infrastructure for sharing multimedia meeting records, especially as multimedia technologies become more lightweight and workers more mobil...
Patrick Chiu, John S. Boreczky, Andreas Girgensohn...