Sciweavers

1906 search results - page 189 / 382
» Data Privacy
Sort
View
131
Voted
WISA
2007
Springer
15 years 9 months ago
Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...
William O. Wilson, Jan Feyereisl, Uwe Aickelin
158
Voted
ACSAC
2000
IEEE
15 years 8 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
104
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
A Declarative Control Language for Dependable XML Message Queues
We present a novel approach for the implementation of efficient and dependable web service engines (WSEs). A WSE instance represents a single node in a distributed network of par...
Alexander Böhm 0002, Carl-Christian Kanne, Gu...
113
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
138
Voted
SP
2008
IEEE
187views Security Privacy» more  SP 2008»
15 years 3 months ago
Efficient and Robust TCP Stream Normalization
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson