Sciweavers

1788 search results - page 51 / 358
» Integrating Security into the Curriculum
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
AMC
2005
116views more  AMC 2005»
14 years 11 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
SERP
2004
15 years 1 months ago
Using UML in a Risk-Driven Development Process
Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security i...
Siv Hilde Houmb, Ørjan Markhus Lillevik
HAIS
2008
Springer
15 years 28 days ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 6 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin