Sciweavers

318 search results - page 23 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
ICDE
2005
IEEE
63views Database» more  ICDE 2005»
14 years 1 months ago
Privacy Contracts as an Extension of Privacy Policies
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations pu...
Hendrik J. G. Oberholzer, Martin S. Olivier
TC
2002
13 years 7 months ago
Dynamic Power Management for Nonstationary Service Requests
Dynamic Power Management (DPM) is a design methodology aiming at reducing power consumption of electronic systems by performing selective shutdown of idle system resources. The eff...
Eui-Young Chung, Luca Benini, Alessandro Bogliolo,...
ACSAC
2001
IEEE
13 years 11 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 1 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
COLCOM
2007
IEEE
13 years 9 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...