Sciweavers

TISSEC
2002
57views more  TISSEC 2002»
13 years 11 months ago
Simple, state-based approaches to program-based anomaly detection
Christoph C. Michael, Anup K. Ghosh
TISSEC
2002
123views more  TISSEC 2002»
13 years 11 months ago
An algebraic approach to IP traceback
We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback problem) during a denial of service attack. Previous so...
Drew Dean, Matthew K. Franklin, Adam Stubblefield
TISSEC
2002
57views more  TISSEC 2002»
13 years 11 months ago
A fine-grained access control system for XML documents
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
TISSEC
2002
63views more  TISSEC 2002»
13 years 11 months ago
Improving the granularity of access control for Windows 2000
Michael M. Swift, Anne Hopkins, Peter Brundrett, C...
TISSEC
2002
82views more  TISSEC 2002»
13 years 11 months ago
An algebra for composing access control policies
Piero A. Bonatti, Sabrina De Capitani di Vimercati...
TISSEC
2002
82views more  TISSEC 2002»
13 years 11 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
TISSEC
2002
51views more  TISSEC 2002»
13 years 11 months ago
Secure and selective dissemination of XML documents
Elisa Bertino, Elena Ferrari
TISSEC
2002
67views more  TISSEC 2002»
13 years 11 months ago
Remus: a security-enhanced operating system
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...
TISSEC
2002
75views more  TISSEC 2002»
13 years 11 months ago
Termination in language-based systems
Language runtime systems are increasingly being embedded in systems to support runtime extensibility via mobile code. Such systems raise a number of concerns when the code running...
Algis Rudys, Dan S. Wallach