Sciweavers

Share
14 search results - page 1 / 3
» securware 2008
Sort
View
SECURWARE
2008
IEEE
9 years 6 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh
SECURWARE
2008
IEEE
9 years 6 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
SECURWARE
2008
IEEE
9 years 6 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
SECURWARE
2008
IEEE
9 years 6 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert
SECURWARE
2008
IEEE
9 years 6 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
books