Sciweavers

1410 search results - page 214 / 282
» An operational approach to the design of workflow systems
Sort
View
NDSS
2005
IEEE
15 years 7 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...
DEON
2010
Springer
15 years 6 months ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 5 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
92
Voted
ACSAC
2006
IEEE
15 years 7 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
DBISP2P
2005
Springer
129views Database» more  DBISP2P 2005»
15 years 7 months ago
Querying a Super-Peer in a Schema-Based Super-Peer Network
We propose a novel approach for de ning and querying a super-peer within a schema-based super-peer network organized into a two-level architecture: the low level, called the peer l...
Domenico Beneventano, Sonia Bergamaschi, Francesco...