Sciweavers

447 search results - page 19 / 90
» Rule Languages for Security and Privacy in Cooperative Syste...
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 2 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
INFOCOM
2011
IEEE
14 years 1 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
ACSAC
1999
IEEE
15 years 2 months ago
Policy-Based Management: Bridging the Gap
In a policy-based system, policy goals are described with respect to network entities (e.g., networks and users) instead of enforcement points (e.g., firewalls and routers). This ...
Susan Hinrichs
ACSAC
2003
IEEE
15 years 1 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...