Sciweavers

5665 search results - page 243 / 1133
» Introduction to Computer Security
Sort
View
102
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 14 days ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
ICDCSW
2005
IEEE
15 years 6 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
132
Voted
GRID
2005
Springer
15 years 6 months ago
Bridging organizational network boundaries on the grid
— The Grid offers significant opportunities for performing wide area distributed computing, allowing multiple organizations to collaborate and build dynamic and flexible virtual ...
Jefferson Tan, David Abramson, Colin Enticott
DISCEX
2003
IEEE
15 years 5 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
92
Voted
SP
1990
IEEE
15 years 4 months ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland