Sciweavers

308 search results - page 57 / 62
» SPIN! Data Mining System Based on Component Architecture
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 10 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
SAC
2006
ACM
14 years 2 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
TES
2001
Springer
14 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
APSEC
2003
IEEE
14 years 2 months ago
An XVCL Approach to Handling Variants: A KWIC Product Line Example
We developed XVCL (XML-based Variant Configuration Language), a method and tool for product lines, to facilitate handling variants in reusable software assets (such as architectur...
Hongyu Zhang, Stan Jarzabek
BMCBI
2004
189views more  BMCBI 2004»
13 years 8 months ago
B.E.A.R. GeneInfo: A tool for identifying gene-related biomedical publications through user modifiable queries
Background: Once specific genes are identified through high throughput genomics technologies there is a need to sort the final gene list to a manageable size for validation studie...
Guohui Zhou, Xinyu Wen, Hang Liu, Michael J. Schli...