Sciweavers

1564 search results - page 278 / 313
» Security in the Web Services Framework
Sort
View
NORDSEC
2009
Springer
15 years 6 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 6 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
IEEESCC
2007
IEEE
15 years 6 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICICS
2007
Springer
15 years 3 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia