Sciweavers

192 search results - page 16 / 39
» Transparent security for collaborative environments
Sort
View
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
TRUSTBUS
2007
Springer
14 years 1 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
JSAC
2006
114views more  JSAC 2006»
13 years 7 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
RTCSA
1997
IEEE
13 years 11 months ago
A distributed multimedia toolbox
Emphasis of our research lies on the application of realtime multimedia technology: tele-teaching. teleconferencing arid collaborative work. To support this research we need a rea...
Hans Scholten, Pierre G. Jansen