Sciweavers

1484 search results - page 254 / 297
» Security policies for downgrading
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deļ¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
WPES
2003
ACM
14 years 1 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information ļ¬ltering and with providing the most ā€œrelevantā€ answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao
SAFECOMP
2001
Springer
14 years 27 days ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...
OOPSLA
1999
Springer
14 years 22 days ago
Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming
The Advanced Teaching and Learning Academic Server (Atlas) is a software system that supports web-based learning. Students can register for courses, and can navigate through perso...
Mik Kersten, Gail C. Murphy
CCS
1994
ACM
14 years 18 days ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford