Sciweavers

1281 search results - page 42 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
CCS
2009
ACM
15 years 8 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
JBI
2006
15 years 1 months ago
What's in a character?
Systematic analyses are included as integral parts of bioinformatic analysis. The use of phenetic and phylogenetic trees in many of the newer areas of biology create a need for bi...
Robert DeSalle
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
15 years 8 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
15 years 7 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
HASE
2008
IEEE
15 years 8 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani