Sciweavers

6303 search results - page 1209 / 1261
» A Generated Management for Distributed Systems
Sort
View
IMC
2009
ACM
15 years 5 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
SACMAT
2009
ACM
15 years 5 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
FGCN
2008
IEEE
161views Communications» more  FGCN 2008»
15 years 5 months ago
The Development of Software Pricing Schemata and Its Application to Software Industry in Korea
The purpose of this this research is to suggest comprehensive pricing schemata that software developers can use in the integrated state of software uses. To do so, we have reviewe...
Youngsik Kwak, Yunkyung Lee, Yoonsik Kwak
CCGRID
2007
IEEE
15 years 5 months ago
Exploiting Lustre File Joining for Effective Collective IO
Lustre is a parallel file system that presents high aggregated IO bandwidth by striping file extents across many storage devices. However, our experiments indicate excessively wid...
Weikuan Yu, Jeffrey S. Vetter, Shane Canon, Song J...
CCS
2007
ACM
15 years 5 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
« Prev « First page 1209 / 1261 Last » Next »