Sciweavers

434 search results - page 15 / 87
» Security Documentation
Sort
View
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
13 years 7 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
DBSEC
2003
140views Database» more  DBSEC 2003»
13 years 9 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica
SIGITE
2005
ACM
14 years 1 months ago
Integration of information assurance and security into the IT2005 model curriculum
In this paper we present the context of the work of the Curriculum Committee on IT2005, the IT curriculum volume described in the Overview Draft document of the Joint Task Force f...
Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lun...
CSFW
2012
IEEE
11 years 10 months ago
Information-Flow Security for a Core of JavaScript
—Tracking information flow in dynamic languages remains an important and intricate problem. This paper makes substantial headway toward understanding the main challenges and res...
Daniel Hedin, Andrei Sabelfeld
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
13 years 11 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop