Sciweavers

2270 search results - page 156 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
108
Voted
ACL
1993
15 years 4 months ago
The Effect of Establishing Coherence in Ellipsis and Anaphora Resolution
This paper presents a new model of anaphoric processing that utilizes the establishment of coherence relations between clauses in a discourse. We survey data that comprises a curr...
Andrew Kehler
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
130
Voted
ISPEC
2010
Springer
15 years 5 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ECR
2010
129views more  ECR 2010»
15 years 3 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...
181
Voted
PDP
2008
IEEE
15 years 10 months ago
System-Level Virtualization for High Performance Computing
System-level virtualization has been a research topic since the 70’s but regained popularity during the past few years because of the availability of efficient solution such as...
Geoffroy Vallée, Thomas Naughton, Christian...