Sciweavers

519 search results - page 17 / 104
» Enhancing information systems security in an academic organi...
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang
ICPP
2003
IEEE
14 years 1 months ago
Towards Grid Based Intelligent Information Systems
Multi agent systems, Grid technology, Semantic Web, and Web Intelligence paradigm are three modern approaches in information technologies, which we put together in our research eff...
A. Min Tjoa, Peter Brezany, Ivan Janciak
JSW
2007
90views more  JSW 2007»
13 years 7 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
SOUPS
2005
ACM
14 years 1 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
14 years 8 months ago
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason
We are experiencing a new Social Web, where people share, communicate, commiserate, and conflict with each other. As evidenced by systems like Wikipedia, twitter, and delicious.co...
Ed H. Chi