Sciweavers

6812 search results - page 29 / 1363
» Detection of Information Flows
Sort
View
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 1 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
PROFES
2007
Springer
15 years 3 months ago
Improving an Industrial Reference Process by Information Flow Analysis: A Case Study
Reference processes are supposed to be the basis for collaboration and mature cooperation in software development. Large business organizations need large and diverse reference pro...
Kai Stapel, Kurt Schneider, Daniel Lübke, Tho...
IFIP
2010
Springer
14 years 4 months ago
Information Flow Analysis via Path Condition Refinement
We present a new approach to information flow control (IFC), ploits counterexample-guided abstraction refinement (CEGAR) technology. The CEGAR process is built on top of our existi...
Mana Taghdiri, Gregor Snelting, Carsten Sinz
DBSEC
2006
115views Database» more  DBSEC 2006»
14 years 11 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
CIA
2007
Springer
15 years 4 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...