Sciweavers

781 search results - page 105 / 157
» An Integrated Model for Hybrid Securities
Sort
View
ESORICS
1994
Springer
15 years 4 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CORR
2004
Springer
146views Education» more  CORR 2004»
14 years 11 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
ACSAC
2010
IEEE
14 years 10 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
CCS
2007
ACM
15 years 6 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
ICCV
2011
IEEE
13 years 12 months ago
Video Primal Sketch: A Generic Middle-Level Representation of Video
This paper presents a middle-level video representation named Video Primal Sketch (VPS), which integrates two regimes of models: i) sparse coding model using static or moving prim...
Zhi Han, Zongben Xu, Song-Chun Zhu