Sciweavers

337 search results - page 37 / 68
» Managing the Health of Security Experiments
Sort
View
SASO
2007
IEEE
14 years 4 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
ATAL
2006
Springer
13 years 11 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 4 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
PAKM
2004
13 years 11 months ago
XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application
Abstract. Knowledge management solutions relying on central repositories sometimes have not met expectations, since users often create knowledge ad-hoc using their individual vocab...
Christoph Tempich, Marc Ehrig, Christiaan Fluit, P...
MEDES
2010
ACM
13 years 4 months ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa