Sciweavers

1323 search results - page 164 / 265
» Updatable Security Views
Sort
View
ICICS
2007
Springer
15 years 6 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
148
Voted
CNIS
2006
15 years 3 months ago
An efficient hybrid algorithm for multidimensional packet classification
Multidimensional Packet Classification is one of the most critical functions for network security devices such as firewalls and intrusion detection systems. Due to the worst case ...
Yaxuan Qi, Jun Li
DBSEC
2004
83views Database» more  DBSEC 2004»
15 years 3 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
LISA
2001
15 years 3 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
IM
2003
15 years 3 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed