Sciweavers

1147 search results - page 172 / 230
» Transformation of Access Rights
Sort
View
ICADL
2004
Springer
115views Education» more  ICADL 2004»
14 years 4 months ago
PaSE: Locating Online Copy of Scientific Documents Effectively
The need for fast and vast dissemination of research results has led a new trend such that more number of authors post their documents to personal or group Web spaces so that other...
Byung-Won On, Dongwon Lee
RAID
2004
Springer
14 years 4 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
ISHPC
1999
Springer
14 years 2 months ago
Utilization of Cache Area in On-Chip Multiprocessor
On-chip multiprocessor can be an alternative to the wide-issue superscalar processor approach which is currently the mainstream to exploit the increasing number of transistors on ...
Hitoshi Oi, N. Ranganathan
ACSAC
2004
IEEE
14 years 2 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
14 years 20 days ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi