Sciweavers

986 search results - page 155 / 198
» Protecting the Intranet Against
Sort
View
ECIS
2001
13 years 9 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
PDPTA
2004
13 years 9 months ago
A Case for Queue-to-Queue, Back-Pressure-Based Congestion Control for Grid Networks
Standard "new-Reno" TCP faces some performance limitations in very high throughput IP WAN networks, (e.g., computing grids) due to a long end-to-end congestion feedback l...
Marc Herbert, Pascale Vicat-Blanc Primet
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
OSDI
1994
ACM
13 years 9 months ago
Implementation and Performance of Application-Controlled File Caching
Traditional le system implementations do not allow applications to control le caching replacement decisions. We have implemented two-level replacement, a scheme that allows appl...
Pei Cao, Edward W. Felten, Kai Li
GLOBECOM
2008
IEEE
13 years 9 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair