Sciweavers

1186 search results - page 123 / 238
» A New Approach to Secure Logging
Sort
View
112
Voted
LISA
2007
15 years 3 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
109
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 4 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
CASES
2005
ACM
15 years 2 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
80
Voted
ESEM
2009
ACM
15 years 7 months ago
We need more coverage, stat! classroom experience with the software ICU
For empirical software engineering to reach its fullest potential, we must develop effective, experiential approaches to learning about it in a classroom setting. In this paper, ...
Philip Johnson, Shaoxuan Zhang
115
Voted
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 4 months ago
Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics
Abstract. Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality....
Christian W. Günther, Wil M. P. van der Aalst