Sciweavers

3047 search results - page 301 / 610
» A Secure Distributed Search System
Sort
View
CCS
2004
ACM
15 years 10 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
WAOA
2004
Springer
85views Algorithms» more  WAOA 2004»
15 years 9 months ago
A PTAS for Delay Minimization in Establishing Wireless Conference Calls
A prevailing feature of mobile telephony systems is that the location of a mobile user may be unknown. Therefore, when the system has to establish a call between users, it may nee...
Leah Epstein, Asaf Levin
COOPIS
2003
IEEE
15 years 9 months ago
From Where to What: Metadata Sharing for Digital Photographs with Geographic Coordinates
Abstract. We describe LOCALE, a system that allows cooperating information systems to share labels for photographs. Participating photographs are enhanced with a geographic locatio...
Mor Naaman, Andreas Paepcke, Hector Garcia-Molina
DISCEX
2003
IEEE
15 years 9 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...
ISHPC
1999
Springer
15 years 8 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson