![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation
Distributed DoS (Denial-of-Service) attacks, or say DDoS attacks, have reportedly caused the most serious losses in recent years and such attacks are getting worse. How to efficiently detect DDoS attacks has n...
-
Chapter and Conference Paper
Grou** Provenance Information to Improve Efficiency of Access Control
Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Prove...
-
Chapter and Conference Paper
Reconsidering Data Logging in Light of Digital Forensics
Logs record the events that have happened within in a system so they are considered the history of system activities. They are one of the objects that digital forensic investigators would like to examine when ...
-
Chapter and Conference Paper
Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks
Nowadays, with over 70% of attacks carried out over the web application level, organizations need all the help they can get in making their system secure. Web Application Firewalls (WAFs) are among the tools t...
-
Chapter and Conference Paper
Formal Verification for Access Control in Web Information Sharing System
When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there...