Sciweavers

1949 search results - page 123 / 390
» Protective Interface Specifications
Sort
View
ICDCS
2003
IEEE
14 years 3 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
LCN
2002
IEEE
14 years 3 months ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju
ACSAC
2000
IEEE
14 years 2 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
IFIP
1994
Springer
14 years 2 months ago
Trends in Environmental Information Processing
In recent years, systems for processing environmental information have been evolving from research and development systems to practical applications. Today, many of these systems ...
Franz Josef Radermacher, Wolf-Fritz Riekert, Bernd...
CSCW
2012
ACM
12 years 5 months ago
Public curation of a historic collection: a means for speaking safely in public
We showcase the Voices from the Rwanda Tribunal project and associated website that provides online public access to a set of historic video interviews with personnel from the Int...
Trond T. Nilsen, Nell Carden Grey, Batya Friedman