Sciweavers

18697 search results - page 167 / 3740
» Systemic Security Management
Sort
View
PE
2007
Springer
154views Optimization» more  PE 2007»
15 years 4 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...
ACSAC
2001
IEEE
15 years 8 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
137
Voted
ISI
2006
Springer
15 years 4 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
CCS
2009
ACM
15 years 11 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ICIP
2008
IEEE
16 years 6 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...