-
1
-
-
58149203602
-
GEMOM-Significant and measurable progress beyond the state of the art
-
26-31 October
-
H. Abie, I. Dattani, M. Novkovic, J. Bigham, S. Topham, and R. Savola, GEMOM - Significant and measurable progress beyond the state of the art. in Proc. ICSNC 2008, 26-31 October, 2008.
-
(2008)
Proc. ICSNC 2008
-
-
Abie, H.1
Dattani, I.2
Novkovic, M.3
Bigham, J.4
Topham, S.5
Savola, R.6
-
2
-
-
58149182029
-
-
1 June, accessed June 10th, 2009, from
-
J. DeMott. The evolving art of fuzzing, 1 June, 2006, accessed June 10th, 2009, from http://www.vdalabs.com/tools/The-Evolving-Art-of-Fuzzing.pdf.
-
(2006)
The Evolving Art of Fuzzing
-
-
DeMott, J.1
-
3
-
-
58149201620
-
-
ESB. Accessed June 30th, 2009, from
-
ESB. Enterprise Service Bus (ESB). Accessed June 30th, 2009, from http://www.sonicsoftware.com/psm/enterprise-service-bus/index.ssp.
-
Enterprise Service Bus (ESB)
-
-
-
5
-
-
77950998890
-
-
IBM., accessed July 3rd, 2009 from
-
IBM. IBM WebSphere MQ support, accessed July 3rd, 2009 from http://www-01.ibm.com/software/integration/wmq/support/.
-
IBM WebSphere MQ Support
-
-
-
6
-
-
33845251872
-
Towards a managed extensible control plane for knowledge-based networking
-
Springer Berlin/Heidelberg,/, (0302-9743):, 15 October
-
D. Lewis, J. Keeney, D. OSullivan, and S. Guo, Towards a managed extensible control plane for knowledge-based networking, Lecture Notes in Computer Science, Large Scale Management of Distributed Systems, Springer Berlin/Heidelberg, 4269/2006(0302-9743):98-111, 15 October, 2006.
-
(2006)
Lecture Notes in Computer Science, Large Scale Management of Distributed Systems
, vol.4269
, Issue.2006
, pp. 98-111
-
-
Lewis, D.1
Keeney, J.2
Osullivan, D.3
Guo, S.4
-
7
-
-
77950997808
-
Semantic message oriented middleware for publish/subscribe networks, sensors, and command, control, communications, and intelligence (C3I) technologies for homeland security and homeland defense III
-
In proceedings of the SPIE
-
H. Li and G. Jiang. Semantic message oriented middleware for publish/subscribe networks, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III. In proceedings of the SPIE. In proceedings of the SPIE, 5403:24-133, 2004.
-
(2004)
Proceedings of the SPIE
, vol.5403
, pp. 24-133
-
-
Li, H.1
Jiang, G.2
-
9
-
-
34548143043
-
A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services
-
Springer Berlin/Heidelberg,/, (0302-9743):, 06 June
-
S. Parkin, D. Ingham, and G. Morgan. A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 4526/2007(0302-9743):9-19, 06 June, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4526
, Issue.2007
, pp. 9-19
-
-
Parkin, S.1
Ingham, D.2
Morgan, G.3
-
11
-
-
84899203852
-
-
Accessed July 1st, 2009, from
-
TIBCO. Rendezvous. Accessed July 1st, 2009, from http://www.tibco.com/ software/messaging/rendezvous/default.jsp.
-
Rendezvous
-
-
-
12
-
-
70449502638
-
Identification of basic measurable security components for a distributed messaging system
-
June 18-23, 2009-Athens/Vouliagmeni, Greece, IEEE Computer Society
-
R. Savola and H. Abie, Identification of Basic Measurable Security Components for a Distributed Messaging System, The 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2009, June 18-23, 2009-Athens/Vouliagmeni, Greece, IEEE Computer Society, pp. 121-128.
-
(2009)
3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)
, pp. 121-128
-
-
Savola, R.1
Abie, H.2
-
13
-
-
35048873754
-
Rights-carrying and self-enforcing information objects for information distribution systems
-
Malaga, Spain, LNCS 3269(0302-9743):, 27-29 October
-
H. Abie, P. Spilling, and B. Foyn, Rights-carrying and self-enforcing information objects for information distribution systems, Lecture notes in computer science, Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, LNCS 3269(0302-9743):546-561, 27-29 October, 2004.
-
(2004)
Lecture Notes in Computer Science, Information and Communications Security: 6th International Conference, ICICS 2004
, pp. 546-561
-
-
Abie, H.1
Spilling, P.2
Foyn, B.3
-
14
-
-
0037232265
-
Security in an autonomic computing environment
-
D. M. Chess, C. C. Palmer, and S. R. White, Security in an autonomic computing environment, IBM Systems Journal, Vol. 42, No 1, 2003 107-118.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.1
, pp. 107-118
-
-
Chess, D.M.1
Palmer, C.C.2
White, S.R.3
-
17
-
-
84884691527
-
An adaptable security manager for real-time transactions
-
19-21 June
-
S. H. Son, R. Zimmerman, and J. Hansson. An adaptable security manager for real-time transactions, In Proc. 12th Euromicro Conference on Real-Time Systems, pages 63-70, 19-21 June, 2000.
-
(2000)
Proc. 12th Euromicro Conference on Real-time Systems
, pp. 63-70
-
-
Son, S.H.1
Zimmerman, R.2
Hansson, J.3
-
18
-
-
38049129803
-
-
LNCS Springer Berlin/Heidelberg,/, April 12
-
S. A. Macskassy and F. Provost, A brief survey of machine learning methods for classification in networked data and an application to suspicion scoring, Statistical Network Analysis: Models, Issues, and New Directions, LNCS Springer Berlin/Heidelberg, Vol. 4503/2007, pp. 172-175, April 12, 2008.
-
(2008)
A Brief Survey of Machine Learning Methods for Classification in Networked Data and an Application to Suspicion Scoring, Statistical Network Analysis: Models, Issues, and New Directions
, vol.4503
, Issue.2007
, pp. 172-175
-
-
Macskassy, S.A.1
Provost, F.2
-
19
-
-
74249094009
-
Semantics of static, adaptive, and incremental security policies
-
Indianapolis, Technical Report ATM 2001(8104-05)-1, The Aerospace Corporation July
-
L. Marcus, Semantics of static, adaptive, and incremental security policies, First Symposium on Requirements Engineering for Information Security (SREIS) March 2001, Indianapolis, Technical Report ATM 2001(8104-05)-1, The Aerospace Corporation July 2001.
-
(2001)
First Symposium on Requirements Engineering for Information Security (SREIS) March 2001
-
-
Marcus, L.1
-
20
-
-
3242798215
-
-
May
-
P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng, A taxonomy of compositional adaptation, May, 2004.
-
(2004)
A Taxonomy of Compositional Adaptation
-
-
McKinley, P.1
Sadjadi, S.2
Kasten, E.3
Cheng, B.4
-
21
-
-
33750014792
-
A Bioinspired approach for self-protecting an organic middleware with artificial antibodies, self-organizing systems
-
Springer Berlin/Heidelberg,/, September 21
-
A. Pietzowski, B. Satzger, W. Trumler, and T. Ungerer, A Bioinspired Approach for Self-protecting an Organic Middleware with Artificial Antibodies, Self-Organizing Systems, LNCS, Springer Berlin/Heidelberg, Vol. 4124/2006, pp. 202-215, September 21, 2006.
-
(2006)
LNCS
, vol.4124
, Issue.2006
, pp. 202-215
-
-
Pietzowski, A.1
Satzger, B.2
Trumler, W.3
Ungerer, T.4
-
22
-
-
30644473909
-
Adaptive trust negotiation and access control
-
DOI 10.1145/1063979.1064004, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Seamons, Adaptive trust negotiation and access control. In Proc. 10th ACM symposium on Access control models and technologies, pages 139-146, 1-3 June, 2005. (Pubitemid 43087470)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
23
-
-
34748910209
-
A survey of adaptive middleware
-
East Lansing, Michigan, December
-
S. Sadjadi, A Survey of Adaptive Middleware, Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University, East Lansing, Michigan, December 2003.
-
(2003)
Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University
-
-
Sadjadi, S.1
-
26
-
-
84944315981
-
Practical and theoretical issues on adaptive security
-
Novosibirsk State Technical University, and Adaptive security in complex information systems, (8023863):, 28 June-6 July
-
A. Shnitko, Practical and Theoretical Issues on Adaptive Security, Novosibirsk State Technical University, and Adaptive security in complex information systems, in Proc. 7th Korea-Russia International Symposium on Science and Technology, (8023863):206-210, 28 June-6 July, 2003.
-
(2003)
Proc. 7th Korea-Russia International Symposium on Science and Technology
, pp. 206-210
-
-
Shnitko, A.1
-
27
-
-
0030706556
-
Threat-adaptive security policy
-
5-7 February
-
R. M. Venkatesan and S. Bhattacharya, Threat-adaptive security policy, in Proc. IEEE International Performance, Computing, and Communications Conference, pages 525-531, 5-7 February, 1997.
-
(1997)
Proc. IEEE International Performance, Computing, and Communications Conference
, pp. 525-531
-
-
Venkatesan, R.M.1
Bhattacharya, S.2
-
29
-
-
74249092475
-
Adaptive security and trust management for autonomic message-oriented middleware
-
October 12-14, in Macau SAR, P.R.China
-
H. Abie, Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware, IEEE Symposium on Trust, Security and Privacy for Pervasive Applications (TSP) 2009, October 12-14, 2009 in Macau SAR, P.R.China.
-
(2009)
IEEE Symposium on Trust, Security and Privacy for Pervasive Applications (TSP) 2009
-
-
Abie, H.1
-
30
-
-
84962702813
-
Anomaly-based self-protection against network attacks
-
Ed.: M. Parashar and S. Hariri, CRC Press
-
G. Qu and S. Hariri, Anomaly-Based Self-Protection against Network Attacks, in Autonomic Computing: Concepts, Infrastructure, and Applications, Ed.: M. Parashar and S. Hariri, CRC Press, 2007, pp. 493-521.
-
(2007)
Autonomic Computing: Concepts, Infrastructure, and Applications
, pp. 493-521
-
-
Qu, G.1
Hariri, S.2
-
31
-
-
79960422013
-
A comparison of two approaches for achieving flexible and adaptive security middleware
-
Leuven, Belgium, December 2, ACM 2008
-
T. Goovaerts, B. D. Win, and W. Joosen, A comparison of two approaches for achieving flexible and adaptive security middleware, Proc. of the 2008 workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, pp.19-24.
-
(2008)
Proc. of the 2008 Workshop on Middleware Security
, pp. 19-24
-
-
Goovaerts, T.1
Win, B.D.2
Joosen, W.3
-
32
-
-
46849111613
-
Virtualised trusted computing platform for adaptive security enforcement of web services interactions
-
9-13 July
-
I. Djordjevic, S.K. Nair, and T. Dimitrakos, Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions, IEEE Int. Conference on Web Services (ICWS 2007), 9-13 July 2007, pp 615-622.
-
(2007)
IEEE Int. Conference on Web Services (ICWS 2007)
, pp. 615-622
-
-
Djordjevic, I.1
Nair, S.K.2
Dimitrakos, T.3
-
33
-
-
70449686292
-
Software security assurance of telecommunication systems
-
April 2-4, Ouarzazate, Morocco
-
R. Savola, Software security assurance of telecommunication systems. Proc of the Int. Conf on Multimedia Computing and Systems (ICSMCS), April 2-4, 2009, Ouarzazate, Morocco, 6 p.
-
(2009)
Proc of the Int. Conf on Multimedia Computing and Systems (ICSMCS)
, pp. 6
-
-
Savola, R.1
|