Safe and Efficient Strategies for Updating Firewall Policies (English)
- New search for: Zeeshan, A.
- New search for: Imine, A.
- New search for: Rusinowitch, M.
- New search for: Zeeshan, A.
- New search for: Imine, A.
- New search for: Rusinowitch, M.
- New search for: Katsikas, Sokratis K.
- New search for: Lopez, Javier
- New search for: Soriano, Miguel
In:
Trust, privacy, and security in digital business
6264
;
45-57
;
2010
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Safe and Efficient Strategies for Updating Firewall Policies
-
Contributors:Zeeshan, A. ( author ) / Imine, A. ( author ) / Rusinowitch, M. ( author ) / Katsikas, Sokratis K. / Lopez, Javier / Soriano, Miguel
-
Conference:International conference; 7th, Trust, privacy, and security in digital business ; 2010 ; Bilbao, Spain
-
Published in:Trust, privacy, and security in digital business , 6264 ; 45-57LECTURE NOTES IN COMPUTER SCIENCE , 6264 ; 45-57
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2010-01-01
-
Size:13 pages
-
Remarks:Includes bibliographical references and author index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Usage Control, Risk and TrustKrautsevich, L. / Lazouski, A. / Martinelli, F. / Mori, P. / Yautsiukhin, A. et al. | 2010
- 13
-
Attacking Image Recognition Captchas: A Naive but Effective ApproachFritsch, C. / Netter, M. / Reisser, A. / Pernul, G. et al. | 2010
- 26
-
An Insider Threat Prediction ModelKandias, M. / Mylonas, A. / Virvilis, N. / Theoharidou, M. / Gritzalis, D. et al. | 2010
- 38
-
A Call Conference Room Interception Attack and its DetectionVrakas, N. / Geneiatakis, D. / Lambrinoudakis, C. et al. | 2010
- 45
-
Safe and Efficient Strategies for Updating Firewall PoliciesZeeshan, A. / Imine, A. / Rusinowitch, M. et al. | 2010
- 58
-
A Privacy-Preserving Architecture for the Semantic Web Based on Tag SuppressionParra-Arnau, J. / Rebollo-Monedero, D. / Forne, J. et al. | 2010
- 69
-
Context-Aware Privacy Design Pattern SelectionPearson, S. / Shen, Y. et al. | 2010
- 81
-
Real-Time Remote Attestation with Privacy ProtectionYu, A. / Feng, D. et al. | 2010
- 93
-
Private Searching on MapReduceZhu, H. / Bao, F. et al. | 2010
- 102
-
In Search of Search PrivacyOlivier, M.S. / Brandi, W. et al. | 2010
- 117
-
Untraceability and Profiling Are Not Mutually ExclusiveCanard, S. / Jambert, A. et al. | 2010
- 129
-
Privacy Policy ReferencingJosang, A. / Fritsch, L. / Mahler, T. et al. | 2010
- 141
-
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication ProtocolAlcaide, A. / Palomar, E. / Gonzalez-Tablas, A.I. / Ribagorda, A. et al. | 2010
- 153
-
Extending XACML Access Control Architecture for Allowing Preference-Based AuthorisationKounga, G. / Mont, M.C. / Bramhall, P. et al. | 2010
- 165
-
An Agent Based Back-End RFID Tag Management SystemRekleitis, E. / Rizomiliotis, P. / Gritzalis, S. et al. | 2010
- 177
-
Assessing the Usability of End-User Security SoftwareIbrahim, T. / Furnell, S.M. / Papadaki, M. / Clarke, N.L. et al. | 2010
- 190
-
Building ISMS through the Reuse of KnowledgeSanchez, L.E. / Santos-Olmo, A. / Fernandez-Medina, E. / Piattini, M. et al. | 2010
- 202
-
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented TrustworthinessFazeli, S. / Zarghami, A. / Dokoohaki, N. / Matskin, M. et al. | 2010
- 214
-
Security for Dynamic Service-Oriented eCollaboration: Architectural Alternatives and Proposed SolutionFritsch, C. / Pernul, G. et al. | 2010
- 227
-
Analyzing Information Security Awareness through Networks of AssociationTsohou, A. / Karyda, M. / Kokolakis, S. / Kiountouzis, E. et al. | 2010
- 238
-
Efficiency Improvement Of Homomorphic E-AuctionPeng, K. / Bao, F. et al. | 2010