Sciweavers

2178 search results - page 182 / 436
» Toward Systemically Secure IT Architectures
Sort
View
215
Voted
ASPLOS
1998
ACM
15 years 7 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
PCI
2005
Springer
15 years 9 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
156
Voted
ANSOFT
2002
159views more  ANSOFT 2002»
15 years 3 months ago
Using Component-Based Development and Web Technologies to Support a Distributed Data Management System
Over recent years, "Internet-able" applications have been used to support domains where distributed functionality is essential. This flexibility is also pertinent in situ...
M. Brian Blake, Gail Hamilton, Jeffrey Hoyt
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 9 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh
CASES
2005
ACM
15 years 5 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...