Sciweavers

772 search results - page 30 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 2 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 1 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
IHI
2010
124views Healthcare» more  IHI 2010»
13 years 2 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
MC
2003
102views Computer Science» more  MC 2003»
13 years 9 months ago
Embedded Interactive Systems: Toward Everyday Environments as the Interface
Under headings such as ubiquitous, invisible and ambient computing, new approaches to human-computer interfacing are investigated that give primacy to the physical world. It is en...
Hans-Werner Gellersen