Sciweavers

4413 search results - page 773 / 883
» Security for biometric data
Sort
View
126
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
140
Voted
GRID
2006
Springer
15 years 3 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 3 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
CONCURRENCY
2007
83views more  CONCURRENCY 2007»
15 years 3 months ago
Enabling community access to TeraGrid visualization resources
Visualization is an important part of the data analysis process. Many researchers, however, do not have access to the resources required to do visualization effectively for large ...
Justin Binns, Jonathan DiCarlo, Joseph A. Insley, ...
119
Voted
JSAC
2008
167views more  JSAC 2008»
15 years 3 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell