Sciweavers

3349 search results - page 111 / 670
» Data Security
Sort
View
114
Voted
SAFECOMP
2000
Springer
15 years 7 months ago
The Safety Management of Data-Driven Safety-Related Systems
Many safety-related systems are built from generic software which is customised to work in a particular situation by static configuration data. Examples of such systems are railwa...
A. G. Faulkner, P. A. Bennett, R. H. Pierce, I. H....
163
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
15 years 1 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
131
Voted
SACMAT
2005
ACM
15 years 9 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
162
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 7 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
150
Voted
WETICE
2007
IEEE
15 years 9 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi