Sciweavers

2079 search results - page 184 / 416
» Quantifying Information Flow
Sort
View
CN
2004
98views more  CN 2004»
13 years 9 months ago
On selection of candidate paths for proportional routing
QoS routing involves selection of paths for flows based on the knowledge at network nodes about the availability of resources along paths, and the QoS requirements of flows. Sever...
Srihari Nelakuditi, Zhi-Li Zhang, David Hung-Chang...
IEEEIAS
2008
IEEE
14 years 3 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
HPCA
2006
IEEE
14 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
SACMAT
2009
ACM
14 years 3 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 2 months ago
Information in Health Care Process - Evaluation Toolkit Development
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
Heidi Häkkinen, Pekka Turunen, Ton A. M. Spil