Sciweavers

1422 search results - page 44 / 285
» Information security and risk management
Sort
View
ITRUST
2005
Springer
14 years 2 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
IAW
2003
IEEE
14 years 2 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
CSFW
2006
IEEE
14 years 2 months ago
Noninterference in the Presence of Non-Opaque Pointers
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Daniel Hedin, David Sands
JBI
2007
113views Bioinformatics» more  JBI 2007»
13 years 8 months ago
Description of a method to support public health information management: Organizational network analysis
In this case study, we describe a method that has potential to provide systematic support for public health information management. Public health agencies depend on specialized in...
Jacqueline Merrill, Suzanne Bakken, Maxine Rockoff...