Sciweavers

2024 search results - page 75 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
JCP
2007
126views more  JCP 2007»
15 years 4 months ago
ADE: Utility Driven Self-management in a Networked Environment
ADE, autonomic distributed environment, is a system which engages autonomic elements to automatically take an existing centralized application and distribute it across available re...
Debzani Deb, M. Muztaba Fuad, Michael J. Oudshoorn
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 5 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
118
Voted
WISA
2004
Springer
15 years 10 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
ICOIN
2001
Springer
15 years 9 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
BMCBI
2008
160views more  BMCBI 2008»
15 years 4 months ago
Feature selection environment for genomic applications
Background: Feature selection is a pattern recognition approach to choose important variables according to some criteria in order to distinguish or explain certain phenomena (i.e....
Fabrício Martins Lopes, David Correa Martin...