Sciweavers

6555 search results - page 1142 / 1311
» Secure attribute-based systems
Sort
View
138
Voted
DEON
2010
Springer
15 years 8 months ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 8 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
COMPSAC
2009
IEEE
15 years 8 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
INFOCOM
2000
IEEE
15 years 7 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 7 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
« Prev « First page 1142 / 1311 Last » Next »