Sciweavers

1407 search results - page 191 / 282
» Systems Theory Model for Information Security
Sort
View
PODC
2012
ACM
11 years 11 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 2 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
WWW
2003
ACM
14 years 10 months ago
Automatic Summarization for Financial News Delivery on Mobile Devices
Wireless access with mobile devices is a promising addition to the WWW and traditional electronic business. Mobile devices provide convenience and portable access to the huge info...
Christopher C. Yang, Fu Lee Wang
SEMWEB
2007
Springer
14 years 3 months ago
The PRIOR+: Results for OAEI Campaign 2007
Ontology mapping is to find semantic correspondences between similar elements of different ontologies. It is critical to achieve semantic interoperability in the WWW. This paper su...
Ming Mao, Yefei Peng