Sciweavers

414 search results - page 13 / 83
» Secure Border Control Processes
Sort
View
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 6 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
CCS
2007
ACM
15 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IFIP
2004
Springer
15 years 5 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
NETWORK
2007
100views more  NETWORK 2007»
14 years 11 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 5 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon