Sciweavers

2281 search results - page 194 / 457
» Security Patterns and Secure Systems Design
Sort
View
STORAGESS
2005
ACM
15 years 6 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
118
Voted
SAFECOMP
1999
Springer
15 years 5 months ago
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems
Microprocessor-based systems are increasingly used to control safety-critical systems (e.g., air and railway traffic control, nuclear plant control, aircraft and car control). In t...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
TRUSTBUS
2009
Springer
15 years 7 months ago
A Formalization of HIPAA for a Medical Messaging System
Abstract. The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance syste...
Peifung E. Lam, John C. Mitchell, Sharada Sundaram
81
Voted
ISI
2007
Springer
15 years 7 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
112
Voted
CCGRID
2002
IEEE
15 years 5 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran