Sciweavers

626 search results - page 109 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
BMCBI
2006
129views more  BMCBI 2006»
13 years 7 months ago
A literature-based similarity metric for biological processes
Background: Recent analyses in systems biology pursue the discovery of functional modules within the cell. Recognition of such modules requires the integrative analysis of genome-...
Monica Chagoyen, Pedro Carmona-Saez, Concha Gil, J...
VIZSEC
2005
Springer
14 years 1 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
SISW
2003
IEEE
14 years 28 days ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
BMCBI
2008
149views more  BMCBI 2008»
13 years 6 months ago
MD-SeeGH: a platform for integrative analysis of multi-dimensional genomic data
Background: Recent advances in global genomic profiling methodologies have enabled multidimensional characterization of biological systems. Complete analysis of these genomic prof...
Bryan Chi, Ronald J. deLeeuw, Bradley P. Coe, Raym...