Sciweavers

1347 search results - page 256 / 270
» Towards a Secure Data Stream Management System
Sort
View
COMPSAC
2005
IEEE
14 years 1 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
NDSS
2006
IEEE
14 years 1 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 26 days ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
IANDC
2006
77views more  IANDC 2006»
13 years 7 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
14 years 2 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan