Sciweavers

8503 search results - page 1359 / 1701
» Secure Software Architectures
Sort
View
122
Voted
WPES
2005
ACM
15 years 9 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
134
Voted
EGC
2005
Springer
15 years 9 months ago
HotGrid: Graduated Access to Grid-Based Science Gateways
Abstract. We describe the idea of a Science Gateway, an applicationspecific task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Roy Williams, Conrad Steenberg, Julian J. Bunn
SIGCOMM
2004
ACM
15 years 9 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
136
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 9 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
IEEEARES
2010
IEEE
15 years 9 months ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
« Prev « First page 1359 / 1701 Last » Next »