Sciweavers

1356 search results - page 26 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 1 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
CCS
2006
ACM
13 years 11 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
PERCOM
2006
ACM
13 years 7 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones
PR
2006
78views more  PR 2006»
13 years 7 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
ECCV
2002
Springer
14 years 9 months ago
Multi-view Matching for Unordered Image Sets, or "How Do I Organize My Holiday Snaps?"
There has been considerable success in automated reconstruction for image sequences where small baseline algorithms can be used to establish matches across a number of images. In c...
Frederik Schaffalitzky, Andrew Zisserman