Sciweavers

1949 search results - page 95 / 390
» Protective Interface Specifications
Sort
View
TSI
2008
135views more  TSI 2008»
13 years 8 months ago
Jade, un environnement d'administration autonome
This paper presents the design, implementation and evaluation of Jade, an environment for autonomic management of legacy software infrastructures. This environment relies on two ma...
Noel De Palma, Sara Bouchenak, Fabienne Boyer, Dan...
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
14 years 10 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 9 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
SRDS
1999
IEEE
14 years 1 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
ISSA
2004
13 years 10 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche