-
1
-
-
33746368048
-
Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
-
July
-
B. Sun et al., "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Vehic. Tech., vol. 55, no. 4, July 2006, pp.1385-96.
-
(2006)
IEEE Trans. Vehic. Tech
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
-
2
-
-
33745689203
-
Accountability in Electronic Commerce Protocols
-
May
-
R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, May 1996, pp. 313-28.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
3
-
-
23044534113
-
Practical Reasoning about Accountability in Electronic Commerce Protocols
-
Dec. 6-7
-
S. Kungpisdan and Y. Permpoontanalarp, "Practical Reasoning about Accountability in Electronic Commerce Protocols," Proc. 4th ICISC '01, vol. 2288, Dec. 6-7, 2001, pp. 268-84.
-
(2001)
Proc. 4th ICISC '01
, vol.2288
, pp. 268-284
-
-
Kungpisdan, S.1
Permpoontanalarp, Y.2
-
4
-
-
0037297882
-
Accountable Web-Computing
-
Feb
-
A. L. Rosenberg, "Accountable Web-Computing," IEEE Trans. Parallel and Distrib. Sys., vol. 14, no. 2, Feb. 2003, pp. 97-106.
-
(2003)
IEEE Trans. Parallel and Distrib. Sys
, vol.14
, Issue.2
, pp. 97-106
-
-
Rosenberg, A.L.1
-
5
-
-
79551623723
-
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
-
A.R. Butt et al., "Fine-Grain Access Control for Securing Shared Resources in Computational Grids," Proc. IPDPS.
-
Proc. IPDPS
-
-
Butt, A.R.1
-
7
-
-
0039334688
-
The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems
-
Oct
-
D. S. Wallach, A. W. Appel, and E. W. Felten, "The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems," ACM Trans. Software Eng. and Methodology, vol. 9, no. 4, Oct. 2000, pp. 341-78.
-
(2000)
ACM Trans. Software Eng. and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
8
-
-
35248853729
-
Implementing Copyright Limitations in Rights Expression Languages
-
Washington, DC, Nov. 18
-
D. K. Mulligan and A. Burstein, "Implementing Copyright Limitations in Rights Expression Languages," 2002 ACM Wksp. Digital Rights Mgmt. Washington, DC, Nov. 18, 2002.
-
(2002)
2002 ACM Wksp. Digital Rights Mgmt
-
-
Mulligan, D.K.1
Burstein, A.2
-
9
-
-
1942433797
-
Digital Rights Management {and, or, vs.} the Law
-
Apr
-
P. Samuelson, "Digital Rights Management {and, or, vs.} the Law," Commun. ACM, vol. 46, no. 4, Apr. 2003, pp. 41-45.
-
(2003)
Commun. ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
10
-
-
0027668428
-
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
-
Sept
-
P. Helman and G. Liepins, "Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse," IEEE Trans. Software Eng., vol. 19, no. 9, Sept., 1993, pp. 886-901.
-
(1993)
IEEE Trans. Software Eng
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
11
-
-
0003346599
-
Verification Strategies for Establishing Reliability and Validity in Qualitative Research
-
J. M. Morse et al., "Verification Strategies for Establishing Reliability and Validity in Qualitative Research," Int'l. J. Qualitative Methods, vol. 1, no. 2, 2002.
-
(2002)
Int'l. J. Qualitative Methods
, vol.1
, Issue.2
-
-
Morse, J.M.1
-
12
-
-
42649088128
-
Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks
-
Apr
-
Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Commun. Mag., vol. 46, no. 4, Apr. 2008, pp. 116-26.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
13
-
-
70350055283
-
Accountability Using Flow-Net: Design, Implementation, and Performance Evaluation
-
to be submitted for publication
-
Y. Xiao, D. Takahashi, and K. Meng, "Accountability Using Flow-Net: Design, Implementation, and Performance Evaluation," to be submitted for publication.
-
-
-
Xiao, Y.1
Takahashi, D.2
Meng, K.3
-
14
-
-
70350068836
-
Retrieving Knowledge from Auditing Log-Files for Computer and Network Forensics and Accountability
-
Feb
-
D. Takahashi and Y. Xiao, "Retrieving Knowledge from Auditing Log-Files for Computer and Network Forensics and Accountability," Security and Commun. Net., vol. 1, no. 2, Feb. 2008, pp. 147-60.
-
(2008)
Security and Commun. Net
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
15
-
-
70350074710
-
Building a Wireless Capturing Tool for WiFi
-
and Commun. Net, to appear
-
K. Meng, Y. Xiao, and S. V. Vrbsky, "Building a Wireless Capturing Tool for WiFi," to appear, Security and Commun. Net.
-
Security
-
-
Meng, K.1
Xiao, Y.2
Vrbsky, S.V.3
|