Sciweavers

577 search results - page 78 / 116
» An enterprise assurance framework
Sort
View
ATAL
2004
Springer
14 years 3 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CCS
2004
ACM
14 years 3 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
ICDCS
2003
IEEE
14 years 3 months ago
QoS-Assured Service Composition in Managed Service Overlay Networks
Many value-added and content delivery services are being offered via service level agreements (SLAs). These services can be interconnected to form a service overlay network (SON) ...
Xiaohui Gu, Klara Nahrstedt, Rong N. Chang, Christ...
DSS
2007
226views more  DSS 2007»
13 years 9 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
ICDE
2001
IEEE
192views Database» more  ICDE 2001»
14 years 11 months ago
Integrating Data Mining with SQL Databases: OLE DB for Data Mining
The integration of data mining with traditional database systems is key to making it convenient, easy to deploy in real applications, and to growing its user base. In this paper w...
Amir Netz, Surajit Chaudhuri, Usama M. Fayyad, Jef...