Sciweavers

519 search results - page 34 / 104
» Enhancing information systems security in an academic organi...
Sort
View
CCS
2010
ACM
13 years 8 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ICDCS
2007
IEEE
14 years 2 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 1 months ago
Organizational Culture and the Performance of Critical Infrastructure: Modeling and Simulation in Socio-Technological Systems
Civil infrastructures are vital elements of a nation’s physical well-being and quality of life because modern economies rely on the services these systems provide to move goods,...
Richard G. Little
CORR
2004
Springer
142views Education» more  CORR 2004»
13 years 7 months ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...