Sciweavers

1770 search results - page 149 / 354
» Writing requirements in computer security
Sort
View
ICDCSW
2007
IEEE
15 years 10 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser
ASM
2008
ASM
15 years 5 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
ICCV
2011
IEEE
14 years 3 months ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
132
Voted
CCS
2007
ACM
15 years 10 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 10 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...