Sciweavers

762 search results - page 95 / 153
» Modeling and Simulating Information Security Management
Sort
View
COOPIS
2002
IEEE
14 years 24 days ago
Composing and Deploying Grid Middleware Web Services Using Model Driven Architecture
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of complex grid applications, such as large-scale distributed co...
Aniruddha S. Gokhale, Balachandran Natarajan
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
CONTEXT
2007
Springer
14 years 2 months ago
Dialectic Approach for Using Viewpoint Discrepancies in Learning
Abstract. The paper proposes a dialectic approach to exploit discrepancies of viewpoints for learning. The approach is illustrated with an elaborated example. A computational frame...
Christiana Panayiotou, Vania Dimitrova
ICDCSW
2007
IEEE
14 years 2 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
CONTEXT
2007
Springer
14 years 2 months ago
An Operational Definition of Context
The definition of context experienced an evolution in the research area of context-aware computing, but still suffers from either generality or incompleteness. Furthermore, many de...
Andreas Zimmermann, Andreas Lorenz, Reinhard Opper...