Sciweavers

2178 search results - page 278 / 436
» Toward Systemically Secure IT Architectures
Sort
View
IPCCC
2006
IEEE
14 years 2 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
ACSAC
2003
IEEE
14 years 1 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
TGIS
2002
175views more  TGIS 2002»
13 years 7 months ago
Using Ontologies for Integrated Geographic Information Systems
Today, there is a huge amount of data gathered about the Earth, not only from new spatial information systems, but also from new and more sophisticated data collection technologie...
Frederico T. Fonseca, Max J. Egenhofer, Peggy Agou...
DSRT
2008
IEEE
14 years 2 months ago
Observability Checking to Enhance Diagnosis of Real Time Electronic Systems
This paper describes a new property checking approach in order to enhance the diagnosis ability of an electronic embedded system, included in an automotive application. We conside...
Manel Khlif, Mohamed Shawky
CISIS
2010
IEEE
14 years 1 months ago
Bringing Introspection Into the BlobSeer Data-Management System Using the MonALISA Distributed Monitoring Framework
Abstract—Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for largescale distribute...
Alexandra Carpen-Amarie, Jing Cai, Alexandru Costa...