Sciweavers

935 search results - page 171 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
SRDS
2007
IEEE
15 years 7 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu
ICCBR
2005
Springer
15 years 6 months ago
A Knowledge-Intensive Method for Conversational CBR
In conversational case-based reasoning (CCBR), a main problem is how to select the most discriminative questions and display them to users in a natural way to alleviate users’ co...
Mingyang Gu, Agnar Aamodt
IJCAI
2003
15 years 2 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
MOBISYS
2010
ACM
15 years 3 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
LISA
2007
15 years 3 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns