Sciweavers

1988 search results - page 280 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
TITS
2011
150views more  TITS 2011»
13 years 4 months ago
Online Spatio-Temporal Risk Assessment for Intelligent Transportation Systems
—Due to modern pervasive wireless technologies and high-performance monitoring systems, spatio-temporal information plays an important role in areas such as intelligent transport...
Ondrej Linda, Milos Manic
OTM
2004
Springer
14 years 2 months ago
A Grid-Based Approach for Processing Group Activity Log Files
The information collected regarding group activity in a collaborative learning environment requires classifying, structuring and processing. The aim is to process this information ...
Fatos Xhafa, Santi Caballé, Thanasis Darado...
SACMAT
2009
ACM
14 years 3 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
ACSAC
2010
IEEE
13 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ICITS
2009
13 years 6 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...