Sciweavers

859 search results - page 129 / 172
» Security for Key Management Interfaces
Sort
View
VIZSEC
2005
Springer
14 years 3 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
AOIS
2003
13 years 11 months ago
I-MINDS: An Agent-Oriented Information System for Applications in Education
Abstract. In this paper, we describe an Intelligent Multiagent Infrastructure for Distributed Systems in Education (or I-MINDS) framework that applies an agent-oriented information...
Leen-Kiat Soh, Xuli Liu, XueSong Zhang, Jameela Al...
ICCCI
2009
Springer
14 years 4 months ago
SemCards: A New Representation for Realizing the Semantic Web
Abstract. The Semantic Web promises increased precision in automated information sorting, searching, organizing and summarizing. Realizing this requires significantly more reliabl...
Kristinn R. Thórisson, Nova Spivack, James ...
SYSTOR
2010
ACM
14 years 2 months ago
Operating system virtualization: practice and experience
Operating system (OS) virtualization can provide a number of important benefits, including transparent migration of applications, server consolidation, online OS maintenance, and...
Oren Laadan, Jason Nieh
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 12 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu