The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification l...
Myong H. Kang, Judith N. Froscher, Amit P. Sheth, ...
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
The core problem of multi-agent distributed data mining technology not concern particular data mining techniques although the latter is now paid the most attention. Its core probl...
Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoil...