Sciweavers

11594 search results - page 2055 / 2319
» Cooperation in Service Systems
Sort
View
ICEGOV
2007
ACM
15 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
CLEF
2006
Springer
15 years 8 months ago
QolA: Fostering Collaboration Within QA
In this paper we suggest a QA pilot task, dubbed QolA, whose joint rationale is allow for collaboration among systems, increase multilinguality and multicollection use, and investi...
Diana Santos, Luís Costa
ISSA
2004
15 years 5 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
ISSA
2004
15 years 5 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
170
Voted
USS
2004
15 years 5 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
« Prev « First page 2055 / 2319 Last » Next »