Sciweavers

425 search results - page 84 / 85
» Audit
Sort
View
IEEESP
2010
101views more  IEEESP 2010»
13 years 6 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
JBCS
2010
152views more  JBCS 2010»
13 years 5 months ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...
JCNS
2010
81views more  JCNS 2010»
13 years 5 months ago
Sensory information in local field potentials and spikes from visual and auditory cortices: time scales and frequency bands
Studies analyzing sensory cortical processing or trying to decode brain activity often rely on a combination of different electrophysiological signals, such as local field potentia...
Andrei Belitski, Stefano Panzeri, Cesare Magri, Ni...
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 4 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
TISSEC
2010
119views more  TISSEC 2010»
13 years 2 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...