Sciweavers

SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 3 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 3 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 3 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
14 years 3 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
SP
1999
IEEE
125views Security Privacy» more  SP 1999»
14 years 3 months ago
A Multi-Threading Architecture for Multilevel Secure Transaction Processing
A TCB and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment is presented. Our design ...
Haruna R. Isa, William R. Shockley, Cynthia E. Irv...
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
14 years 3 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
14 years 3 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
SP
1999
IEEE
110views Security Privacy» more  SP 1999»
14 years 3 months ago
Firmato: A Novel Firewall Management Toolkit
Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai...