Sciweavers

830 search results - page 114 / 166
» Owned Policies for Information Security
Sort
View
CN
1999
93views more  CN 1999»
14 years 11 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
SACMAT
2009
ACM
15 years 6 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
PERCOM
2006
ACM
15 years 11 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
IDTRUST
2009
ACM
15 years 6 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
CCS
2010
ACM
15 years 1 days ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami