Sciweavers

376 search results - page 35 / 76
» Teaching context in information security
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
HAPTICS
2009
IEEE
14 years 2 months ago
Haptic stiffness identification by veterinarians and novices: A comparison
Palpation is important in both veterinary and medical health professions. It is however difficult to learn, teach and assess. More must be understood about the skills involved in ...
Neil Forrest, Sarah Baillie, Hong Z. Tan
ESSOS
2010
Springer
14 years 4 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
ACSAC
1999
IEEE
14 years 9 days ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
MTSR
2007
Springer
14 years 2 months ago
Comparing Different Metadata Application Profiles for Agricultural Learning Repositories
Agricultural learning repositories can provide new opportunities for sharing, accessing, using and reusing learning resources online. Metadata plays a crucial role in such systems:...
Nikos Manouselis, Gauri Salokhe, Johannes Keizer