Sciweavers

979 search results - page 130 / 196
» Developing Dynamic Security Policies
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
DGO
2007
150views Education» more  DGO 2007»
13 years 11 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
FIS
2008
13 years 11 months ago
A Framework for Selecting Trusted Semantic Web Services
Trusted semantic Web services might play a key role in the Future Internet. In this paper, we describe WSTO our comprehensive trust based framework supporting the selection and inv...
Stefania Galizia, Alessio Gugliotta
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
13 years 4 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 4 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen