Sciweavers

6137 search results - page 35 / 1228
» Securing Collaborative Applications
Sort
View
ECTEL
2006
Springer
13 years 11 months ago
Informal Learning Theories and Tools to Support Knowledge Management in Distributed CoPs
In this work informal learning theories and practices and social networking features are taken as starting points to build a reference collaboration model to support collaborative ...
Maria Chiara Pettenati, Maria Ranieri
HPDC
2005
IEEE
14 years 1 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
WPES
2003
ACM
14 years 24 days ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
HIP
2005
Springer
174views Cryptology» more  HIP 2005»
14 years 1 months ago
Collaborative Filtering CAPTCHAs
Abstract. Current CAPTCHAs require users to solve objective questions such as text recognition or image recognition. We propose a class of CAPTCHAs based on collaborative filterin...
Monica Chew, J. D. Tygar