Sciweavers

2337 search results - page 354 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 2 months ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd
SWS
2006
ACM
14 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ISCC
2005
IEEE
14 years 2 months ago
An Optically Controlled Module for Wavelength Conversion Circuits
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (Controlled Wavelength Conversion) protocol [1]. The propo...
Georgios I. Papadimitriou, Amalia N. Miliou, Andre...
DGO
2009
118views Education» more  DGO 2009»
13 years 10 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
SIGIR
2010
ACM
14 years 28 days ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb