Sciweavers

1630 search results - page 284 / 326
» Secure Overlay Network Design
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
SWS
2006
ACM
15 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ACSAC
2003
IEEE
15 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 3 months ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
GLOBAL
2003
Springer
15 years 3 months ago
UML for Global Computing
Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...