Sciweavers

5665 search results - page 336 / 1133
» Introduction to Computer Security
Sort
View
ICPADS
1997
IEEE
15 years 6 months ago
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
COLCOM
2007
IEEE
15 years 6 months ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino
DRM
2006
Springer
15 years 6 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
104
Voted
DAGSTUHL
2006
15 years 3 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer
HASKELL
2008
ACM
15 years 3 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes