Sciweavers

1875 search results - page 180 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SEUS
2008
IEEE
15 years 7 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
87
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 1 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
107
Voted
IMSA
2001
121views Multimedia» more  IMSA 2001»
15 years 2 months ago
Technology Integrated Learning Environment - A Web-based Distance Learning System
This paper analyses the requirements of a third-generation technology integrated learning environment. The architecture proposed is analysed in terms of the generic constraints of...
Regina Gehne, Chris R. Jesshope, Zhenzi Zhang
CCS
2008
ACM
15 years 2 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
CCS
2008
ACM
15 years 2 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...