142
click to vote
CCS
15 years 6 months ago
2006 ACM
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
256
click to vote
ACSW
15 years 4 months ago
2006
The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited...
135
click to vote
ACSAC
15 years 6 months ago
2006 IEEE
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
158
click to vote
CSREASAM
15 years 4 months ago
2006
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. ...
|