Sciweavers

979 search results - page 146 / 196
» Developing Dynamic Security Policies
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 4 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev
APCSAC
2001
IEEE
14 years 1 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 11 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
TIM
2010
144views Education» more  TIM 2010»
13 years 4 months ago
A Decentralized Observer for Ship Power System Applications: Implementation and Experimental Validation
In the last few years, the growing complexity of the electrical power networks, mainly due to the increased use of electronic converters together with the requirements of a higher ...
Andrea Benigni, Gabriele D'Antona, U. Ghisla, Anto...