Sciweavers

98 search results - page 13 / 20
» Best Practices for Building a Security Operations Center
Sort
View
ESCIENCE
2006
IEEE
14 years 1 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 25 days ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
ASIACRYPT
2011
Springer
12 years 7 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
ICAC
2007
IEEE
14 years 1 months ago
Approximation Modeling for the Online Performance Management of Distributed Computing Systems
—A promising method of automating management tasks in computing systems is to formulate them as control or optimization problems in terms of performance metrics. For an online op...
Dara Kusic, Nagarajan Kandasamy, Guofei Jiang
DSOM
2003
Springer
14 years 18 days ago
Automating Enterprise Application Placement in Resource Utilities
Abstract. Enterprise applications implement business resource management systems, customer relationship management systems, and general systems for commerce. These applications rel...
Jerry Rolia, Artur Andrzejak, Martin F. Arlitt