Sciweavers

920 search results - page 78 / 184
» Selecting Secure Passwords
Sort
View
FIS
2008
13 years 11 months ago
A Framework for Selecting Trusted Semantic Web Services
Trusted semantic Web services might play a key role in the Future Internet. In this paper, we describe WSTO our comprehensive trust based framework supporting the selection and inv...
Stefania Galizia, Alessio Gugliotta
IPCCC
2006
IEEE
14 years 3 months ago
AWARDS: an adaptive write strategy for secure local disk systems
Since security is of critical importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increasing number of sec...
Mais Nijim, Xiao Qin, Tao Xie 0004, Mohammed I. Al...
IRI
2006
IEEE
14 years 3 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
HIPEAC
2005
Springer
14 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
MANSCI
2007
70views more  MANSCI 2007»
13 years 9 months ago
Optimal Risk Taking with Flexible Income
We study the portfolio selection problem of an investor who can optimally exert costly effort for more income. The possibility of generating more income, if necessary, increases ...
Jaksa Cvitanic, Levon Goukasian, Fernando Zapatero