Sciweavers

2587 search results - page 10 / 518
» Intrusion Tolerant Systems
Sort
View
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 7 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
109
Voted
SIGOPS
2010
91views more  SIGOPS 2010»
15 years 6 days ago
Why panic()?: improving reliability with restartable file systems
The file system is one of the most critical components of the operating system. Almost all applications running in the operating system require file systems to be available for ...
Swaminathan Sundararaman, Sriram Subramanian, Abhi...
ACSAC
2004
IEEE
15 years 5 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ICICS
2003
Springer
15 years 7 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
FAST
2010
15 years 4 months ago
Membrane: Operating System Support for Restartable File Systems
We introduce Membrane, a set of changes to the operating system to support restartable file systems. Membrane allows an operating system to tolerate a broad class of file system f...
Swaminathan Sundararaman, Sriram Subramanian, Abhi...