Sciweavers

1422 search results - page 213 / 285
» Information security and risk management
Sort
View
ICDIM
2007
IEEE
14 years 3 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
IWIA
2006
IEEE
14 years 3 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
ISI
2004
Springer
14 years 2 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
COOPIS
2000
IEEE
14 years 1 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
ICEIS
1999
IEEE
14 years 1 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos