Sciweavers

1347 search results - page 36 / 270
» Towards a Secure Data Stream Management System
Sort
View
ICNS
2007
IEEE
14 years 1 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 1 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
IPPS
2005
IEEE
14 years 1 months ago
Distributed Data Streams Indexing using Content-Based Routing Paradigm
In recent years, we have seen a dramatic increase in the use of data-centric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and vari...
Ahmet Bulut, Ambuj K. Singh, Roman Vitenberg
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 13 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
SECURWARE
2008
IEEE
14 years 2 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...