Sciweavers

1077 search results - page 152 / 216
» integration 2000
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
149
Voted
ACSAC
2000
IEEE
15 years 7 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
139
Voted
APAQS
2000
IEEE
15 years 7 months ago
Object-Based Data Flow Testing of Web Applications
Recently, the extraordinarygrowth in the World Wide Web has been sweeping through business and industry. Many companies have developed or integrated their mission-critical applica...
Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-...
144
Voted
AUIC
2000
IEEE
15 years 7 months ago
Supporting Special-Purpose Health Care Models via Web Interfaces
The potential of the Web, via both the Internet and intranets, to facilitate development of clinical information systems has been evident for some time. Most Web-based clinical wo...
James R. Warren, Heath K. Frankel, Joseph T. Noone...
117
Voted
CODES
2000
IEEE
15 years 7 months ago
Co-design of interleaved memory systems
Memory interleaving is a cost-efficient approach to increase bandwidth. Improving data access locality and reducing memory access conflicts are two important aspects to achieve hi...
Hua Lin, Wayne Wolf