Sciweavers

CSREASAM
2003
13 years 5 months ago
Implementing a Prototype of the Security Framework for Distributed Brokering Systems
Security is an important element of any system design. Entities supported by a system need to securely interact with each other. The problem gets even more complex in the context ...
Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallicka...
CSREASAM
2003
13 years 5 months ago
Implementing Policy-Based Content Filtering for Web Servers
: Web servers dominate our view of the Web today. Security provided by them has been implemented with varying degrees of success. Web servers are frequently successfully attacked, ...
Tony White, Eugen Bacic
CSREASAM
2003
13 years 5 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
CSREASAM
2003
13 years 5 months ago
Assessing Power Substation Network Security and Survivability: A Work in Progress Report
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Carol Taylor, Paul W. Oman, Axel W. Krings
CSREASAM
2003
13 years 5 months ago
Proactive Containment of Malice in Survivable Distributed Systems
Abstract The uncontrolled propagation of faults due to malicious intrusion can severely decrease system performance and survivability. Our goal is to employ available information a...
Michael G. Merideth, Priya Narasimhan
CSREASAM
2003
13 years 5 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
CSREASAM
2003
13 years 5 months ago
A Shoulder-Surfing Resistant Graphical Password Scheme - WIW
Shushuang Man, Dawei Hong, Manton M. Matthews
CSREASAM
2003
13 years 5 months ago
The Case for Abstracting Security Policies
Anil Madhavapeddy, Alan Mycroft, David Scott, Rich...
CSREASAM
2003
13 years 5 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
CSREASAM
2003
13 years 5 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...