Sciweavers

5665 search results - page 42 / 1133
» Introduction to Computer Security
Sort
View
CSREASAM
2008
13 years 10 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé
INFOCOM
2012
IEEE
11 years 11 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
SC
2005
ACM
14 years 2 months ago
Leading Computational Methods on Scalar and Vector HEC Platforms
The last decade has witnessed a rapid proliferation of superscalar cache-based microprocessors to build high-end computing (HEC) platforms, primarily because of their generality, ...
Leonid Oliker, Jonathan Carter, Michael F. Wehner,...
IWANN
2009
Springer
14 years 3 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Specifically, we briefly review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...