Sciweavers

21 search results - page 4 / 5
» Probability of Attack Based on System Vulnerability Life Cyc...
Sort
View
CODES
2005
IEEE
13 years 11 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
MSS
1999
IEEE
99views Hardware» more  MSS 1999»
13 years 10 months ago
Clustered Multi-media NOD: Popularity-based Article Prefetching and Placement
According to the current profound development of multimedia and networking technologies, the way people communicate with, naturally, has evolved from a textoriented into a multime...
Y.-J. Kim, Tae-uk Choi, K. O. Jung, Y. K. Kang, Se...
ACSAC
2006
IEEE
13 years 12 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
COMPSAC
2007
IEEE
13 years 9 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
DRM
2003
Springer
13 years 11 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia