Sciweavers

302 search results - page 29 / 61
» What happens in films
Sort
View
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 9 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
GECON
2008
Springer
121views Business» more  GECON 2008»
13 years 9 months ago
Monitoring and Reputation Mechanisms for Service Level Agreements
A Service Level Agreement (SLA) is an electronic contract between a service user and a provider, and specifies the service to be provided, Quality of Service (QoS) properties that...
Omer F. Rana, Martijn Warnier, Thomas B. Quillinan...
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 7 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
PDPTA
2010
13 years 5 months ago
Enhancing the Discovery of Web Services: A Keyword-oriented Multiontology Reconciliation
Abstract-- The success of Web Services as a tool to decouple and distribute different processes is beyond any doubt. On the one hand, their distributed nature makes them perfect to...
Carlos Bobed, Eduardo Mena