Sciweavers

12637 search results - page 187 / 2528
» Security for Extensible Systems
Sort
View
BMCBI
2006
122views more  BMCBI 2006»
13 years 9 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson
COMCOM
2006
121views more  COMCOM 2006»
13 years 9 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal

Lecture Notes
404views
15 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
STORAGESS
2006
ACM
14 years 3 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
SACMAT
2011
ACM
13 years 3 days ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni