Sciweavers

2504 search results - page 77 / 501
» Enterprise Security Architecture
Sort
View
AISS
2010
242views more  AISS 2010»
14 years 9 months ago
MLSF: A Framework for Multi-Level Secure Composite Web Services
Web services technologies change the software industry drastically by developing and integrating enterprise web services and applications in order to enable the users to access th...
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 6 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
CCS
2004
ACM
15 years 5 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
DAMON
2006
Springer
15 years 3 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
BTW
2003
Springer
93views Database» more  BTW 2003»
15 years 5 months ago
Information Integration in a Global Enterprise: Some Experiences from a Financial Services Company
: In most commercial enterprises, information is scattered across a large number of (legacy) data stores. Moreover, it is nearly impossible to obtain funding to replace these data ...
Robert Marti