Sciweavers

370 search results - page 57 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
117
Voted
NDSS
2006
IEEE
15 years 7 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
CHI
2004
ACM
16 years 2 months ago
Safety-critical interaction: usability in incidents and accidents
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order...
Philippe A. Palanque, Floor Koornneef, Chris Johns...
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
13 years 4 months ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang
CONEXT
2007
ACM
15 years 5 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
124
Voted
SISW
2005
IEEE
15 years 7 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash