Sciweavers

COMPSEC
2002
185views more  COMPSEC 2002»
14 years 8 days ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
COMPSEC
2002
92views more  COMPSEC 2002»
14 years 8 days ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
COMPSEC
2002
45views more  COMPSEC 2002»
14 years 8 days ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
COMPSEC
2002
134views more  COMPSEC 2002»
14 years 8 days ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...