Sciweavers

590 search results - page 29 / 118
» Security Issues in VOIP Applications
Sort
View
ICWS
2004
IEEE
13 years 9 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
ICSE
2008
IEEE-ACM
14 years 8 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
ESWS
2005
Springer
14 years 1 months ago
Enabling Real World Semantic Web Applications Through a Coordination Middleware
In a real world scenario Semantic Web applications must be capable to cope with the large scale, distributed, heterogeneous, unreliable and insecure environment of the World Wide W...
Robert Tolksdorf, Lyndon J. B. Nixon, Elena Paslar...
EDBT
2012
ACM
262views Database» more  EDBT 2012»
11 years 10 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
ICALT
2008
IEEE
14 years 2 months ago
Secure Certification for ePortfolios
Students often build up portfolios of their achievements as they study and present them when they apply for jobs or for further study. Of increasing interest is the concept of an ...
Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, ...