Sciweavers

18094 search results - page 81 / 3619
» The Architecture of Secure Systems
Sort
View
ANCS
2007
ACM
15 years 3 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
ACSAC
2001
IEEE
15 years 3 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
65
Voted
DEXAW
1998
IEEE
82views Database» more  DEXAW 1998»
15 years 3 months ago
User Authentication in Multidatabase Systems
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for ...
Eyk Hildebrandt, Gunter Saake
ATAL
2009
Springer
15 years 15 days ago
Towards an Architecture for Self-regulating Agents: A Case Study in International Trade
Abstract--Norm-enforcement models applied in human societies may serve as an inspiration for the design of multi-agent systems. Models for norm-enforcement in multi-agent systems o...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
SACMAT
2006
ACM
15 years 5 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen