Sciweavers

1906 search results - page 138 / 382
» Data Privacy
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
150
Voted
USENIX
2000
15 years 4 months ago
Traffic Data Repository at the WIDE Project
It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describe...
Kenjiro Cho, Koushirou Mitsuya, Akira Kato
110
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
89
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
132
Voted
AGENTS
1997
Springer
15 years 7 months ago
Integrating Range and Object Data for Robot Navigation
Most sensors used for robot navigation fall into one of two broad categories: range sensors that give approximate distances to obstacles, and object-based sensors that detect and ...
David Franklin, R. James Firby