Sciweavers

2979 search results - page 318 / 596
» Modelling secure multiagent systems
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 11 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
ACSAC
1999
IEEE
15 years 9 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
122
Voted
EUROSYS
2007
ACM
16 years 1 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
CCS
1993
ACM
15 years 8 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
15 years 2 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier