Sciweavers

ACSAC
2000
IEEE
13 years 8 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
ACSAC
2000
IEEE
13 years 8 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
ACSAC
2000
IEEE
13 years 8 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
ACSAC
2000
IEEE
13 years 8 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
ACSAC
2000
IEEE
13 years 8 months ago
Security Architectures for Controlled Digital Information Dissemination
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
ACSAC
2000
IEEE
13 years 8 months ago
Experience with Software Watermarking
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di M...
ACSAC
2000
IEEE
13 years 8 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
ACSAC
2000
IEEE
13 years 8 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
ACSAC
2000
IEEE
13 years 8 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim