Sciweavers

1422 search results - page 171 / 285
» Information security and risk management
Sort
View
CCS
2011
ACM
12 years 10 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
SACMAT
2003
ACM
14 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
SPIESR
2004
171views Database» more  SPIESR 2004»
14 years 23 hour ago
Interactive segmentation with hidden object-based annotations: toward smart media
In this paper a novel "Smart Media" concept for semantic-based multimedia security and management is proposed. This concept is based on interactive object segmentation (...
Yuriy Rytsar, Sviatoslav Voloshynovskiy, Fré...
CAI
2005
Springer
13 years 10 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
CISS
2008
IEEE
14 years 19 days ago
Portfolio diversification using subspace factorizations
Abstract-- Successful investment management relies on allocating assets so as to beat the stock market. Asset classes are affected by different market dynamics or latent trends. Th...
Ruairi de Frein, Konstantinos Drakakis, Scott Rick...