Sciweavers

756 search results - page 20 / 152
» Modeling Computational Security in Long-Lived Systems
Sort
View
ACSAC
2008
IEEE
15 years 6 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
EDO
2005
Springer
15 years 5 months ago
Secure event types in content-based, multi-domain publish/subscribe systems
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published ...
Lauri I. W. Pesonen, Jean Bacon
HPCC
2007
Springer
15 years 6 months ago
Security Enhancement and Performance Evaluation of an Object-Based Storage System
Object-based storage offloads some works of file systems to storage devices to improve security, scalability, and performance. Security is a main concern when sharing data over ne...
Po-Chun Liu, Sheng-Kai Hung, Yarsun Hsu
PERCOM
2011
ACM
14 years 6 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
SEC
1996
15 years 1 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas