Sciweavers

1801 search results - page 24 / 361
» Implementation-Oriented Secure Architectures
Sort
View
DAWAK
2009
Springer
13 years 5 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
IEEECIT
2010
IEEE
13 years 5 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
CCS
1998
ACM
14 years 4 days ago
A Security Architecture for Computational Grids
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are ...
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven...
NETWORK
2007
100views more  NETWORK 2007»
13 years 7 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
IAJIT
2010
133views more  IAJIT 2010»
13 years 6 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa