Sciweavers

IEEEIAS
2008
IEEE
13 years 11 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
IEEEIAS
2008
IEEE
13 years 11 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
IEEEIAS
2008
IEEE
13 years 11 months ago
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment
Modern cars offer an increasingly powerful Multimedia environment. While also the potential for an application as Human Computer Interface (HCI) is growing, in this paper we conce...
Tobias Hoppe, Stefan Kiltz, Jana Dittmann
IEEEIAS
2008
IEEE
13 years 11 months ago
COTraSE: Connection Oriented Traceback in Switched Ethernet
Layer 2 traceback is an important component of end-toend packet traceback. Whilst IP traceback identifies the origin network, L2 traceback extends the process to provide a more ...
Marios S. Andreou, Aad P. A. van Moorsel
IEEEIAS
2008
IEEE
13 years 11 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro
IEEEIAS
2008
IEEE
13 years 11 months ago
Semantics-Driven Introspection in a Virtual Environment
Francesco Tamberi, Dario Maggiari, Daniele Sgandur...
IEEEIAS
2008
IEEE
13 years 11 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
IEEEIAS
2008
IEEE
13 years 11 months ago
LoSS Detection Approach Based on ESOSS and ASOSS Models
This paper investigates Loss of Self-similarity (LoSS) detection performance using Exact and Asymptotic Second Order Self-Similarity (ESOSS and ASOSS) models. Previous works on Lo...
Mohd Fo'ad Rohani, Mohd Aizaini Maarof, Ali Selama...
IEEEIAS
2008
IEEE
13 years 11 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
IEEEIAS
2008
IEEE
13 years 11 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina