Sciweavers

257 search results - page 35 / 52
» Delegating network security with more information
Sort
View
CIKM
2008
Springer
13 years 8 months ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia
SACMAT
2010
ACM
14 years 6 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 8 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
SOUPS
2009
ACM
14 years 1 months ago
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
A recent trend in social networking, photo/video sharing, and location-sharing services is a demand for more expressive privacy mechanisms that provide greater control over the co...
Michael Benisch, Patrick Gage Kelley, Norman M. Sa...
IEEEARES
2008
IEEE
14 years 1 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen