Sciweavers

376 search results - page 45 / 76
» Teaching context in information security
Sort
View
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
15 years 10 months ago
CAPTCHA-based image labeling on the Soylent Grid
We introduce an open labeling platform for Computer Vision researchers based on Captchas, creating as a byproduct labeled image data sets while supporting web security. For the tw...
Peter Faymonville, Kai Wang, John Miller, Serge J....
CRITIS
2008
15 years 5 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
IADIS
2003
15 years 5 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
ACSAC
2000
IEEE
15 years 8 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
ESORICS
2009
Springer
15 years 10 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...