Sciweavers

47 search results - page 5 / 10
» PAMINA: A Certificate Based Privilege Management System
Sort
View
WMRD
1992
15 years 3 months ago
A Replicated Monitoring Tool
Modeling the reliability of distributed systems requires a good understanding of the reliability of the components. Careful modeling allows highly fault-tolerant distributed appli...
Darrell D. E. Long
83
Voted
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 5 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
EUROSEC
2010
ACM
15 years 5 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
RAID
2010
Springer
14 years 10 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ICST
2010
IEEE
14 years 10 months ago
Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard
— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzade...