Sciweavers

370 search results - page 45 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
CNIS
2006
15 years 3 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller
123
Voted
SAJ
2002
97views more  SAJ 2002»
15 years 1 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
125
Voted
IFIP
2007
Springer
15 years 8 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
123
Voted
CCS
2000
ACM
15 years 6 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
93
Voted
EDBT
2008
ACM
129views Database» more  EDBT 2008»
16 years 2 months ago
Design of PriServ, a privacy service for DHTs
By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data ...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...