Sciweavers

300 search results - page 25 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
IEEEIAS
2008
IEEE
14 years 3 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
CSFW
2007
IEEE
14 years 3 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
PVLDB
2010
163views more  PVLDB 2010»
13 years 7 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion
UAI
2008
13 years 10 months ago
Model-Based Bayesian Reinforcement Learning in Large Structured Domains
Model-based Bayesian reinforcement learning has generated significant interest in the AI community as it provides an elegant solution to the optimal exploration-exploitation trade...
Stéphane Ross, Joelle Pineau