Sciweavers

360 search results - page 7 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
IFIP
2009
Springer
13 years 12 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
CIKM
2010
Springer
13 years 6 months ago
Discriminative factored prior models for personalized content-based recommendation
Most existing content-based filtering approaches including Rocchio, Language Models, SVM, Logistic Regression, Neural Networks, etc. learn user profiles independently without ca...
Lanbo Zhang, Yi Zhang 0001
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 1 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
SECPERU
2006
IEEE
14 years 1 months ago
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web
To assess the trustworthiness of the information published in the World Wide Web referrals are often employed. This is due to the fact that most information sources are visited on...
Vangelis G. Bintzios, Thanasis G. Papaioannou, Geo...
ACSAC
2000
IEEE
13 years 11 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik