Sciweavers

Share
11 search results - page 1 / 3
» dbsec 2008
Sort
View
DBSEC
2008
152views Database» more  DBSEC 2008»
8 years 3 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
DBSEC
2008
103views Database» more  DBSEC 2008»
8 years 3 months ago
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Abstract. When generalization algorithms are known to the public, an adversary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed ...
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
DBSEC
2008
89views Database» more  DBSEC 2008»
8 years 3 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
DBSEC
2008
129views Database» more  DBSEC 2008»
8 years 3 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
DBSEC
2008
107views Database» more  DBSEC 2008»
8 years 3 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
books