Sciweavers

1860 search results - page 271 / 372
» Jiro Storage Management
Sort
View
113
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 9 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
CCGRID
2003
IEEE
15 years 9 months ago
Chameleon: A Resource Scheduler in A Data Grid Environment
Grid computing is moving into two ways. The Computational Grid focuses on reducing execution time of applications that require a great number of computer processing cycles. The Da...
Sang-Min Park, Jai-Hoon Kim
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 9 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
152
Voted
IAW
2003
IEEE
15 years 9 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICNP
2003
IEEE
15 years 9 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha