Sciweavers

196 search results - page 23 / 40
» A Hacking View of Access Control
Sort
View
NAS
2007
IEEE
14 years 4 months ago
An Efficient SAN-Level Caching Method Based on Chunk-Aging
: SAN-level caching can manage caching within a global view so that global hot data can be identified and cached. However, two problems may be encountered in the existing SAN-level...
Jiwu Shu, Yang Wang 0009, Wei Xue, Yifeng Luo
WIKIS
2010
ACM
13 years 7 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
ITICSE
2009
ACM
14 years 4 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
ICMLA
2009
14 years 6 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
14 years 4 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...