Sciweavers

4820 search results - page 211 / 964
» Implementing Signatures for C
Sort
View
FORTE
2004
15 years 4 months ago
A Temporal Logic Based Framework for Intrusion Detection
Abstract. We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications. We specify intrusion patterns as formulas in an expre...
Prasad Naldurg, Koushik Sen, Prasanna Thati
CMS
2001
133views Communications» more  CMS 2001»
15 years 4 months ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...
ISSA
2004
15 years 4 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
WORM
2004
15 years 4 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
108
Voted
OAS
2003
15 years 4 months ago
An ontology for Web service ratings and reputations
Current Web services standards enable publishing service descriptions and finding services by matching requested and published descriptions based on syntactic criteria such as me...
E. Michael Maximilien, Munindar P. Singh