Sciweavers

2281 search results - page 276 / 457
» Security Patterns and Secure Systems Design
Sort
View
132
Voted
AINA
2010
IEEE
15 years 9 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
146
Voted
IWINAC
2005
Springer
15 years 9 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
160
Voted
JAVA
1999
Springer
15 years 8 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
121
Voted
BIOSIG
2003
117views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
Comparative Study on Fingerprint Recognition Systems - Project BioFinger
: This paper describes a comparative study on fingerprint recognition systems – the project BioFinger. The goal of this study is to investigate the capability characteristics of ...
Michael Arnold, Henning Daum, Christoph Busch
145
Voted
ENTCS
2008
136views more  ENTCS 2008»
15 years 3 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...