Sciweavers

6555 search results - page 968 / 1311
» Secure attribute-based systems
Sort
View
ACSAC
2003
IEEE
15 years 10 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
15 years 10 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...
HICSS
2003
IEEE
141views Biometrics» more  HICSS 2003»
15 years 10 months ago
Understanding the Foundation of Mobile Content Quality A Presentation of a New Research Field
This paper studies some problems regarding mobile content quality (MCQ). Since the reason for communication is to be useful, we think that the only way of creating precise target ...
Pär Landor
139
Voted
IAW
2003
IEEE
15 years 10 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
208
Voted
INFOCOM
2003
IEEE
15 years 10 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson