Sciweavers

1401 search results - page 208 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
JSAC
2006
153views more  JSAC 2006»
13 years 8 months ago
Dynamic spectrum access in open spectrum wireless networks
One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spec...
Yiping Xing, Rajarathnam Chandramouli, Stefan Mang...
PDPTA
2004
13 years 10 months ago
Hierarchical Scheduling for State-based Services
Abstract-- Service descriptions based on type hiernd abstract service states ruling the availability of operations permit more secure service combinations in distributed systems de...
Jens Bruhn, Sven Kaffille, Guido Wirtz
DISCEX
2003
IEEE
14 years 2 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
CCGRID
2001
IEEE
14 years 13 days ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster