Sciweavers

1120 search results - page 37 / 224
» Securely sharing neuroimagery
Sort
View
AIMS
2008
Springer
14 years 4 months ago
Secure Sharing of an ICT Infrastructure through Vinci
Fabrizio Baiardi, Daniele Sgandurra
ACMSE
2008
ACM
13 years 12 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ACSAC
2004
IEEE
14 years 1 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
ETRICS
2006
14 years 1 months ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl