Sciweavers

49 search results - page 4 / 10
» sp 2002
Sort
View
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
13 years 10 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
13 years 10 months ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
13 years 10 months ago
HMM-based techniques for speech segments extraction
The goal of the speech segments extraction process is to separate acoustic events of interest (the speech segment to be recognised) in a continuously recorded signal from other par...
Waleed H. Abdulla
SP
2002
IEEE
139views Security Privacy» more  SP 2002»
13 years 10 months ago
Mobile objects in Java
Mobile Objects in Java provides support for object mobility in Java. Similarly to the RMI technique, a notion of client-side stub, called startpoint, is used to communicate transp...
Luc Moreau, Daniel Ribbens
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 10 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash