Sciweavers

754 search results - page 110 / 151
» Can self-managed systems be trusted
Sort
View
ESCIENCE
2006
IEEE
14 years 22 days ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
AIPRF
2008
13 years 10 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
ECIS
2000
13 years 10 months ago
The Issue of Mutuality in ECR Adoption: A Case Study
The adoption of ECR has been slow in many regions, despite its many potential benefits to manufacturers, distributors and retailers within a supply chain through reduction of inven...
Sherah Kurnia, Robert B. Johnston
AAAI
1996
13 years 10 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski