Sciweavers

3712 search results - page 720 / 743
» Role-Based Access Control
Sort
View
AUSFORENSICS
2003
13 years 9 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
CATA
2003
13 years 9 months ago
Vehicle-Bus Interface with GMLAN for Data Collection
Within a few years, nearly every vehicle that General Motors (GM) manufactures will have a microcontroller network known as GMLAN. A few GM vehicles already have the GMLAN network...
David C. Pheanis, Jeffrey A. Tenney
ECIS
2003
13 years 9 months ago
From traditional to virtual organisation: implications for work unit boundaries
Boundary and virtual organisation theory were used to study the implications of organisation level virtualisation for work units. A single case study in a geographically dispersed...
Christopher J. Hemingway, Karin Breu
NETWORKING
2004
13 years 9 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
NSDI
2004
13 years 9 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...