Sciweavers

3544 search results - page 404 / 709
» Information Security in Open Systems
Sort
View
CCS
2004
ACM
15 years 5 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
SAFECOMP
2007
Springer
15 years 6 months ago
Survival by Deception
Abstract. A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously un...
Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Ja...
SAC
2006
ACM
15 years 5 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
SACMAT
2006
ACM
15 years 5 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
AGENTS
1997
Springer
15 years 4 months ago
Integrating Range and Object Data for Robot Navigation
Most sensors used for robot navigation fall into one of two broad categories: range sensors that give approximate distances to obstacles, and object-based sensors that detect and ...
David Franklin, R. James Firby