This dissertation is about the implementation and integration of the interactive markup language to the distributed component object model protocol with the application to modeling distributed file system security. Among the numerous researches in network security, the file system usually plays in the least important role of the spectrum. From the simple Disk Operating System (DOS) to modern Network Operating System (NOS), the file system relies only on one or more login passwords to protect it from being misused. Today the most thorough protection scheme for the file system is from virus protection and removal application, but it does not prevent a hostile but well-behaved program from deleting files or formatting hard disk. There are seve...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
Abstract: The paper presents a detailed, systematized description of the LDAP directory se...
This dissertation is about the implementation and integration of the interactive markup language to ...
This paper describes the implementation of an enforcement module for file system security implemente...
Incorporating security features is one of the most important and challenging tasks in designing dist...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
CD-Rom included ; A Dissertation submitted to the Department of Computer Science and Engineering for...
Sensitive information such as firewall logs or data from intrusion detection systems, has to be stor...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
Abstract- Security is an evolving domain of computer security, network security, cloud security and,...
Support for cooperative distributed applications is an important direction of computer systems resea...
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous ...
Abstract: This paper presents a model of software cryptography system for data protection in Distrib...
In this paper we describe a language based security model for distributed computing based on functio...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
Abstract: The paper presents a detailed, systematized description of the LDAP directory se...
This dissertation is about the implementation and integration of the interactive markup language to ...
This paper describes the implementation of an enforcement module for file system security implemente...
Incorporating security features is one of the most important and challenging tasks in designing dist...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
CD-Rom included ; A Dissertation submitted to the Department of Computer Science and Engineering for...
Sensitive information such as firewall logs or data from intrusion detection systems, has to be stor...
“... oba es gibt kan Kompromiß, zwischen ehrlich sein und link, a wann’s no so afoch ausschaut, und ...
Abstract- Security is an evolving domain of computer security, network security, cloud security and,...
Support for cooperative distributed applications is an important direction of computer systems resea...
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous ...
Abstract: This paper presents a model of software cryptography system for data protection in Distrib...
In this paper we describe a language based security model for distributed computing based on functio...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing fi...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
Abstract: The paper presents a detailed, systematized description of the LDAP directory se...