Sciweavers

2281 search results - page 259 / 457
» Security Patterns and Secure Systems Design
Sort
View
111
Voted
ISSTA
2006
ACM
15 years 9 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
134
Voted
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 10 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
127
Voted
OOPSLA
2001
Springer
15 years 8 months ago
A Categorization of Classes based on the Visualization of their Internal Structure: The Class Blueprint
The reengineering and reverse engineering of software systems is gaining importance in software industry, because the accelerated turnover in software companies creates legacy sys...
Michele Lanza, Stéphane Ducasse
119
Voted
ESORICS
2007
Springer
15 years 7 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
107
Voted
CCS
2010
ACM
15 years 6 months ago
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection
Capturing Fast-Flux Service Networks (FFSNs) by temporal variances is an intuitive way for seeking to identify rapid changes of DNS records. Unfortunately, the features regard to ...
Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee