Sciweavers

754 search results - page 110 / 151
» Can self-managed systems be trusted
Sort
View
ESCIENCE
2006
IEEE
15 years 8 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
NSDI
2007
15 years 6 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
AIPRF
2008
15 years 5 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
ECIS
2000
15 years 5 months ago
The Issue of Mutuality in ECR Adoption: A Case Study
The adoption of ECR has been slow in many regions, despite its many potential benefits to manufacturers, distributors and retailers within a supply chain through reduction of inven...
Sherah Kurnia, Robert B. Johnston
AAAI
1996
15 years 5 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski