Sciweavers

581 search results - page 97 / 117
» policy 2009
Sort
View
SIN
2009
ACM
14 years 3 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...
SOUPS
2009
ACM
14 years 3 months ago
The impact of privacy indicators on search engine browsing patterns
Laboratory studies have shown that when online search engines’ results are annotated with privacy indicators, some consumers will pay a premium to make purchases from sites that...
Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor...
EUROCRYPT
2005
Springer
14 years 2 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
CCGRID
2009
IEEE
14 years 1 months ago
File Clustering Based Replication Algorithm in a Grid Environment
Replication in grid file systems can significantly improves I/O performance of data-intensive applications. However, most of existing replication techniques apply to individual ...
Hitoshi Sato, Satoshi Matsuoka, Toshio Endo
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
14 years 1 months ago
Isochronous manifolds in self-triggered control
Abstract— Feedback control laws are predominantly implemented on digital platforms as periodic tasks. Although periodicity simplifies the analysis and design of the implementati...
Adolfo Anta Martinez, Paulo Tabuada