Sciweavers

5665 search results - page 153 / 1133
» Introduction to Computer Security
Sort
View
SIGUCCS
2003
ACM
14 years 2 months ago
Liberating lab computing: building a stable yet flexible computing environment for students and faculty
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
Kenneth Janz, Pei-Yi Hu
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 10 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
GI
2001
Springer
14 years 1 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 10 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
WIMOB
2008
IEEE
14 years 3 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...