Sciweavers

2648 search results - page 464 / 530
» Human Factors In Computer Security
Sort
View
OOPSLA
2009
Springer
15 years 6 months ago
Reimagining literate programming
In this paper we describe Ginger, a new language with first class support for literate programming. Literate programming refers to a philosophy that argues computer programs shou...
James Dean Palmer, Eddie Hillenbrand
HPCC
2007
Springer
15 years 6 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
ACSAC
2009
IEEE
15 years 3 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
BCSHCI
2007
15 years 1 months ago
Design, use and experience of e-learning systems
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Willem-Paul Brinkman, Annette Payne, Nayna Patel, ...
TON
2002
144views more  TON 2002»
14 years 11 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...