Sciweavers

298 search results - page 46 / 60
» Computer security: quality rather than quantity
Sort
View
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 5 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
PDPTA
2004
13 years 11 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
CCS
2010
ACM
13 years 10 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
CORR
2002
Springer
136views Education» more  CORR 2002»
13 years 9 months ago
Libra: An Economy driven Job Scheduling System for Clusters
Clusters of computers have emerged as mainstream parallel and distributed platforms for high-performance, highthroughput and high-availability computing. To enable effective resou...
Jahanzeb Sherwani, Nosheen Ali, Nausheen Lotia, Za...