Sciweavers

3047 search results - page 152 / 610
» A Secure Distributed Search System
Sort
View
113
Voted
USENIX
2003
15 years 4 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
WWW
2008
ACM
16 years 4 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
IEEECIT
2010
IEEE
15 years 1 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
120
Voted
RP
2009
Springer
121views Control Systems» more  RP 2009»
15 years 10 months ago
Games with Opacity Condition
We describe the class of games with opacity condition, as an adequate model for security aspects of computing systems. We study their theoretical properties, relate them to reachab...
Bastien Maubert, Sophie Pinchinat
130
Voted
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 10 months ago
Integration of news content into web results
Aggregated search refers to the integration of content from specialized corpora or verticals into web search results. Aggregation improves search when the user has vertical intent...
Fernando Diaz