Sciweavers

136 search results - page 23 / 28
» Securing interdependent assets
Sort
View
HICSS
2007
IEEE
88views Biometrics» more  HICSS 2007»
14 years 4 months ago
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
As a Center of Academic Excellence (CAE) in Information Assurance Education, the University of Alaska Fairbanks is committed to promoting a culture of awareness and advancement of...
Kara L. Nance, Brian Hay, Christopher Hecker
NETGAMES
2006
ACM
14 years 3 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
CSREASAM
2009
13 years 10 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
SAC
2005
ACM
14 years 3 months ago
Supporting e-commerce systems formalization with choreography languages
E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the ...
Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gia...
OOPSLA
2005
Springer
14 years 3 months ago
Refactoring support for class library migration
As object-oriented class libraries evolve, classes are occasionally deprecated in favor of others with roughly the same functionality. In Java’s standard libraries, for example,...
Ittai Balaban, Frank Tip, Robert M. Fuhrer