Sciweavers

464 search results - page 50 / 93
» Identity Management
Sort
View
BIOCOMP
2006
13 years 9 months ago
Filtering Tandem Repeats in DNA Sequences
A tandem repeat is a sequence of two or more contiguous, approximate copies of a pattern. Tandem repeats occur in the genomes of both eukaryotic and prokaryotic organisms. They ar...
Dina Sokol, Justin Tojeira
CN
2007
90views more  CN 2007»
13 years 7 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
IDTRUST
2010
ACM
13 years 6 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
XPU
2010
Springer
13 years 6 months ago
Extreme Product Line Engineering - Refactoring for Variability: A Test-Driven Approach
Software product lines - families of similar but not identical software products - need to address the issue of feature variability. That is, a single feature might require various...
Yaser Ghanam, Frank Maurer
DIM
2006
ACM
14 years 1 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...