Sciweavers

2904 search results - page 124 / 581
» Internet Infrastructure Security
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 5 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 3 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
DMIN
2006
123views Data Mining» more  DMIN 2006»
15 years 2 months ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov
SAINT
2002
IEEE
15 years 6 months ago
The Internet Enterprise
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...
ACSAC
2000
IEEE
15 years 6 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...