Sciweavers

1028 search results - page 70 / 206
» Using Attack Graphs to Design Systems
Sort
View
ITS
2000
Springer
112views Multimedia» more  ITS 2000»
14 years 2 months ago
Model of an Adaptive Support Interface for Distance Learning
We developed a distributed support model in an interface for distant learning. The support is integrated into the ExploraGraph navigator which makes it possible to navigate through...
Aude Dufresne
SIGMOD
2008
ACM
118views Database» more  SIGMOD 2008»
14 years 10 months ago
Freebase: a collaboratively created graph database for structuring human knowledge
Freebase is a practical, scalable tuple database used to structure general human knowledge. The data in Freebase is collaboratively created, structured, and maintained. Freebase c...
Kurt D. Bollacker, Colin Evans, Praveen Paritosh, ...
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
14 years 4 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
ESORICS
2009
Springer
14 years 5 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
HHCI
2000
14 years 2 months ago
Haptic Graphs for Blind Computer Users
In this paper we discuss the design of computer-based haptic graphs for blind and visually impaired people with the support of our preliminary experimental results. Since visual i...
Wai Yu, Rameshsharma Ramloll, Stephen A. Brewster