Sciweavers

2057 search results - page 56 / 412
» Distributed Secure Systems: Then and Now
Sort
View
CAISE
1999
Springer
15 years 5 months ago
A Multilevel Secure Workflow Management System
The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification l...
Myong H. Kang, Judith N. Froscher, Amit P. Sheth, ...
109
Voted
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 4 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
77
Voted
HPCC
2007
Springer
15 years 7 months ago
File and Memory Security Analysis for Grid Systems
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Unnati Thakore, Lorie M. Liebrock
98
Voted
ISSE
2006
15 years 23 days ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
124
Voted
IAT
2003
IEEE
15 years 6 months ago
Multi-agent Technology for Distributed Data Mining and Classification
The core problem of multi-agent distributed data mining technology not concern particular data mining techniques although the latter is now paid the most attention. Its core probl...
Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoil...