154
Voted
CCS
15 years 7 months ago
2006 ACM
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
271
Voted
ACSW
15 years 5 months ago
2006
The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited...
144
Voted
ACSAC
15 years 7 months ago
2006 IEEE
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
234
Voted
IEEEARES
15 years 9 months ago
2006 IEEE 165
Voted
CSREASAM
15 years 5 months ago
2006
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. ...
|