Sciweavers

3003 search results - page 400 / 601
» Software Security: Building Security In
Sort
View
GG
2004
Springer
15 years 10 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
ISI
2004
Springer
15 years 10 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
ISI
2004
Springer
15 years 10 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
167
Voted
RAID
2004
Springer
15 years 10 months ago
Symantec Deception Server Experience with a Commercial Deception System
This paper provides an examination of an emerging class of security mechanisms often referred to as deception technologies or honeypots. It is based on our experience over the last...
Brian Hernacki, Jeremy Bennett, Thomas Lofgren
IEEEAMS
2003
IEEE
15 years 10 months ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...