Sciweavers

2281 search results - page 259 / 457
» Security Patterns and Secure Systems Design
Sort
View
ISSTA
2006
ACM
15 years 11 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 12 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
139
Voted
OOPSLA
2001
Springer
15 years 9 months ago
A Categorization of Classes based on the Visualization of their Internal Structure: The Class Blueprint
The reengineering and reverse engineering of software systems is gaining importance in software industry, because the accelerated turnover in software companies creates legacy sys...
Michele Lanza, Stéphane Ducasse
ESORICS
2007
Springer
15 years 9 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
CCS
2010
ACM
15 years 8 months ago
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection
Capturing Fast-Flux Service Networks (FFSNs) by temporal variances is an intuitive way for seeking to identify rapid changes of DNS records. Unfortunately, the features regard to ...
Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee