Sciweavers

772 search results - page 88 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
SMC
2007
IEEE
108views Control Systems» more  SMC 2007»
14 years 3 months ago
Cybersecurity for electric power control and automation systems
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching L...
AINA
2008
IEEE
14 years 3 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung
ICCS
2001
Springer
14 years 1 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
EDOC
2003
IEEE
14 years 2 months ago
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations
In this paper we sketch a framework supporting contract enactment within the context of virtual organisation units that are dynamically created in order to achieve a common object...
Theodosis Dimitrakos, Ivan Djordjevic, Zoran Milos...
BMCBI
2007
195views more  BMCBI 2007»
13 years 9 months ago
NeuroTerrain - a client-server system for browsing 3D biomedical image data sets
Background: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full us...
Carl Gustafson, William J. Bug, Jonathan Nissanov