Sciweavers

1587 search results - page 184 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
158
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
179
Voted
WACV
2002
IEEE
15 years 7 months ago
Mosaic Generation for Under Vehicle Inspection
As the threat of terrorism becomes more prevalent, the need for technological innovations for tighter security rises. Some of the areas where security needs to be increased are at...
Paul E. Dickson, James Li, Zhigang Zhu, Allen R. H...
CCS
2009
ACM
16 years 3 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
127
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 6 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
130
Voted
CF
2005
ACM
15 years 4 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland