Sciweavers

727 search results - page 71 / 146
» Making Distortions Comprehensible
Sort
View
ISVC
2007
Springer
14 years 1 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
14 years 1 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
TCGOV
2005
Springer
14 years 1 months ago
UNICAP: Efficient Decision Support for Academic Resource and Capacity Management
Growing complexity of the data and processes to be managed, as well as the transition from strict governmental regulation towards autonomy make academic institutions a significant ...
Svetlana Vinnik, Marc H. Scholl
CIKM
2005
Springer
14 years 1 months ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 1 months ago
The Research on the Policy Information System: A Case Study of National Health Insurance Policy in Taiwan
A wrong policy is far worse than corruption. It goes without saying that making good policies has its substantial importance and influence. It is assumed that policy information s...
Yu-Ying Ku