Sciweavers

58933 search results - page 97 / 11787
» Information
Sort
View
COMPSAC
2009
IEEE
14 years 5 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
PCI
2009
Springer
14 years 4 months ago
Investigation of Information Dissemination Design Criteria in Large-Scale Network Environments
—The design of efficient information dissemination mechanism is a challenging problem in large-scale network with respect to the number of messages and termination time. In this...
Konstantinos Oikonomou, Dimitrios Kogias, Leonidas...
COLCOM
2008
IEEE
14 years 4 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
IAT
2008
IEEE
14 years 4 months ago
Acquiring Vague Temporal Information from the Web
Many real–world information needs are naturally formulated as queries with temporal constraints. However, the structured temporal background information needed to support such c...
Steven Schockaert, Martine De Cock, Etienne E. Ker...