Sciweavers

2335 search results - page 125 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
ISI
2004
Springer
15 years 10 months ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
WSC
1998
15 years 6 months ago
Initializing On-line Simulations from the State of a Distributed System
In this paper, we address the complex task of initializing an on-line simulation to a current system state collected from an operating physical system. The paper begins by discuss...
Fernando G. Gonzalez, Wayne J. Davis
171
Voted
SASN
2003
ACM
15 years 10 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
127
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...