Sciweavers

519 search results - page 56 / 104
» Enhancing information systems security in an academic organi...
Sort
View
VLDB
2005
ACM
132views Database» more  VLDB 2005»
14 years 1 months ago
MIX: A Meta-data Indexing System for XML
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data wit...
SungRan Cho, Nick Koudas, Divesh Srivastava
SOUPS
2010
ACM
13 years 12 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
JUCS
2008
341views more  JUCS 2008»
13 years 8 months ago
IQM3: Information Quality Management Maturity Model
: In order to enhance their global business performance, organizations must be careful with the quality of their information since it is one of their main assets. Analogies to qual...
Ismael Caballero, Angelica Caro, Coral Calero, Mar...
IWIA
2005
IEEE
14 years 1 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
COMPSAC
2002
IEEE
14 years 1 months ago
Designing a Distributed Software Development Support System Using a Peer-to-Peer Architecture
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Seth Bowen, Frank Maurer