Sciweavers

2363 search results - page 332 / 473
» How Secure is RFID
Sort
View
IEEEARES
2010
IEEE
15 years 7 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...
146
Voted
ESORICS
2008
Springer
15 years 6 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
DBSEC
2004
83views Database» more  DBSEC 2004»
15 years 6 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
ICEB
2004
175views Business» more  ICEB 2004»
15 years 6 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...