Sciweavers

495 search results - page 37 / 99
» MASC - Monitoring and Security of Containers
Sort
View
CCS
2008
ACM
15 years 3 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
DIMVA
2010
15 years 2 months ago
HProxy: Client-Side Detection of SSL Stripping Attacks
Abstract. In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new atta...
Nick Nikiforakis, Yves Younan, Wouter Joosen
SP
2002
IEEE
15 years 28 days ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
EUROCRYPT
2004
Springer
15 years 5 months ago
Efficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...
Michael J. Freedman, Kobbi Nissim, Benny Pinkas
CBSE
2009
Springer
14 years 11 months ago
Towards Dynamic Component Isolation in a Service Oriented Platform
When dealing with dynamic component environments such as the OSGi Service Platform, where components can come from different sources and may be known only during runtime, evaluatin...
Kiev Gama, Didier Donsez