Sciweavers

4923 search results - page 833 / 985
» Software Risk Management
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
SIGITE
2005
ACM
14 years 2 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews
SIGITE
2005
ACM
14 years 2 months ago
Towards using online portfolios in computing courses
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
Bryan Higgs, Mihaela Sabin
STORAGESS
2005
ACM
14 years 2 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
WWW
2005
ACM
14 years 2 months ago
Service discovery and measurement based on DAML-QoS ontology
As more and more Web services are deployed, Web service’s discovery mechanisms become essential. Similar services can have quite different QoS behaviors. For service selection ...
Chen Zhou, Liang-Tien Chia, Bu-Sung Lee