Sciweavers

5 search results - page 1 / 1
» sp 1989
Sort
View
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 8 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 8 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
SP
1989
IEEE
13 years 8 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
STOC
2000
ACM
156views Algorithms» more  STOC 2000»
13 years 9 months ago
Near optimal multiple alignment within a band in polynomial time
Multiple sequence alignment is a fundamental problem in computational biology. Because of its notorious difficulties, aligning sequences within a constant band (c-diagonal) is a ...
Ming Li, Bin Ma, Lusheng Wang