Sciweavers

519 search results - page 44 / 104
» How to make secure email easier to use
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
101
Voted
JUCS
2007
165views more  JUCS 2007»
14 years 9 months ago
An Adaptable Framework for Ontology-based Content Creation on the Semantic Web
: Creation of rich, ontology-based metadata is one of the major challenges in developing the Semantic Web. Emerging applications utilizing semantic web techniques, such as semantic...
Onni Valkeapää, Olli Alm, Eero Hyvö...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
IWC
2006
44views more  IWC 2006»
14 years 9 months ago
Goal-based structuring in recommender systems
Recommender systems help people to find information that is interesting to them. However, current recommendation techniques only address the user's short-term and long-term i...
Mark van Setten, Mettina Veenstra, Anton Nijholt, ...
ISCA
2007
IEEE
128views Hardware» more  ISCA 2007»
15 years 4 months ago
Performance and security lessons learned from virtualizing the alpha processor
Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isola...
Paul A. Karger