مرور Volume 3, Issue 2 بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 4 از 4
-
Alert correlation and prediction using data mining and HMM
(Iranian Society of Cryptology, 2011-07-01)Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs ...
-
A model for specification, composition and verification of access control policies and its application to web services
(Iranian Society of Cryptology, 2011-07-01)Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies ...
-
Separating indexes from data: a distributed scheme for secure database outsourcing
(Iranian Society of Cryptology, 2011-07-01)Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should ...



