Sciweavers

Share
SEC
2000
9 years 5 months ago
CARDS: A Distributed System for Detecting Coordinated Attacks
Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil...
SEC
2000
9 years 5 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
SEC
2000
9 years 5 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
SEC
2000
9 years 5 months ago
Securing Mobile Agents for Electronic Commerce: An Experiment
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
SEC
2000
9 years 5 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...
SEC
2000
9 years 5 months ago
A Flexible Management Framework for Certificate Status Validation
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
books