Sciweavers

519 search results - page 95 / 104
» Enhancing information systems security in an academic organi...
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
BMCBI
2010
223views more  BMCBI 2010»
13 years 3 months ago
MetNetGE: interactive views of biological networks and ontologies
Background: Linking high-throughput experimental data with biological networks is a key step for understanding complex biological systems. Currently, visualization tools for large...
Ming Jia, Suh-Yeon Choi, Dirk Reiners, Eve Syrkin ...
ICNP
2006
IEEE
14 years 2 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
JAMIA
2010
115views more  JAMIA 2010»
13 years 2 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II