Sciweavers

2429 search results - page 258 / 486
» Using Aspects to Design a Secure System
Sort
View
IWINAC
2005
Springer
15 years 8 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
BMCBI
2007
102views more  BMCBI 2007»
15 years 3 months ago
A comprehensive system for evaluation of remote sequence similarity detection
Background: Accurate and sensitive performance evaluation is crucial for both effective development of better structure prediction methods based on sequence similarity, and for th...
Yuan Qi, Ruslan Sadreyev, Yong Wang, Bong-Hyun Kim...
158
Voted
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 9 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
112
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
143
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...