Sciweavers

452 search results - page 27 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
67
Voted
ITRUST
2005
Springer
15 years 3 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CHI
2004
ACM
15 years 10 months ago
How to trust robots further than we can throw them
Panelists with backgrounds in diverse aspects of humanrobot interaction will discuss the challenges of human-robot interaction in terms of operator trust. The panel will showcase ...
David J. Bruemmer, Douglas A. Few, Michael A. Good...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
CW
2004
IEEE
15 years 1 months ago
Joyfoot's Cyber System: A Virtual Landscape Walking Interface Device for Virtual Reality Applications
Technological limitations on current interfaces have made researches to develop new devices to interact with objects in the virtual environment. The goal of this project is to dev...
Salvador Barrera, Hiroki Takahashi, Masayuki Nakaj...