Skip to main content

and
  1. Chapter and Conference Paper

    Minimal Threshold Closure

    Access structure is a flexible mechanism for representing complex access control and authorization policies [1]. Numerous efforts have been devoted to the research of efficient schemes for implementing access ...

    **-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu-Leung Chung in Computer Security – ESORICS 2006 (2006)

  2. No Access

    Article

    Efficient vector quantization using genetic algorithm

    This paper proposes a new codebook generation algorithm for image data compression using a combined scheme of principal component analysis (PCA) and genetic algorithm (GA). The combined scheme makes full use o...

    Hongwei Sun, Kwok-Yan Lam, Siu-Leung Chung, Weiming Dong in Neural Computing & Applications (2005)

  3. No Access

    Chapter and Conference Paper

    An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems

    This paper proposes a new algorithm that improves the efficiency of the anomaly detection stage of a vector-based intrusion detection scheme. In general, intrusion detection schemes are based on the hypothesis...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu in Networking and Mobile Computing (2005)

  4. No Access

    Chapter and Conference Paper

    Application of Content Computing in Honeyfarm

    Currently there are a wide range of techniques dedicated to network security among which honeyfarm is one of the newest development. Honeyfarm provides replication of web sites aiming to redirect hackers from ...

    Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung in Information Security Applications (2005)

  5. No Access

    Chapter and Conference Paper

    Anomaly Detection in Grid Computing Based on Vector Quantization

    An efficient and effective intrusion detection model based the Vector Quantization (VQ) technique is proposed. This model is suitable for security monitoring in the grid computing environment. Experimental res...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung in Grid and Cooperative Computing - GCC 2004 (2004)

  6. No Access

    Chapter and Conference Paper

    Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes

    With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The no...

    Kwok-Yan Lam, **-Bin Zhao, Siu-Leung Chung, Ming Gu in Information Security Applications (2004)

  7. No Access

    Chapter and Conference Paper

    Enhancing the Scalability of the Community Authorization Service for Virtual Organizations

    Grid computing has emerged as a special form of distributed computing and is distinguished from conventional distributed computing by its focus on dynamic, large-scale resource sharing over a wide geographic d...

    Jian-** Yong, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun in Content Computing (2004)

  8. No Access

    Chapter and Conference Paper

    Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems

    With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for building large-scale business information systems. The ...

    **-Bin Zhao, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu in Information Security and Privacy (2004)

  9. No Access

    Chapter and Conference Paper

    Real-Time Emulation of Intrusion Victim in HoneyFarm

    Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques...

    **ng-Yun He, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi in Content Computing (2004)

  10. Chapter and Conference Paper

    Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services

    This paper presents an efficient implementation technique for presenting multivariate audit data needed by statistical-based intrusion detection systems. Multivariate data analysis is an important tool in stat...

    Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung in Applied Cryptography and Network Security (2003)

  11. No Access

    Chapter and Conference Paper

    An Intrusion Detection Architecture for System Security

    Intrusion detection aims to detect security violations from abnormal pattern of system usage. It is required that user activities be monitored by the system and that monitoring information be analysed to recog...

    Lucas Hui, Siu-Leung Chung, Kwok-Yan Lam in Europäischer Informatik Kongreß Architektu… (1993)

  12. No Access

    Chapter and Conference Paper

    Managing Failures in Distributed Systems

    This paper discusses the problems we experienced with the use of a general purpose distributed operating system. It describes the problems with our approach to system availability, and identifies the major pro...

    Kwok-Yan Lam, Siu Leung Chung in Europäischer Informatik Kongreß Architektu… (1993)