Sciweavers

61 search results - page 12 / 13
» Efficient policy analysis for administrative role based acce...
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 6 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
ACSC
2008
IEEE
14 years 25 days ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele
SOCINFO
2010
13 years 1 months ago
SocialWiki: Bring Order to Wiki Systems with Social Context
A huge amount of administrative effort is required for large wiki systems to produce and maintain high quality pages with existing naive access control policies. This paper introdu...
Haifeng Zhao, Shaozhi Ye, Prantik Bhattacharyya, J...
JCP
2008
206views more  JCP 2008»
13 years 6 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
SIGUCCS
2000
ACM
13 years 10 months ago
Remedial Help Desk 101 at Florida State University
The User Services division of the Office of Technology Integration is the "safety net" for computer support at Florida State University (FSU). Areas of support include t...
Diana Orrick, Jeff Bauer, Ernest McDuffie