Sciweavers

756 search results - page 139 / 152
» Leveraging the CAPTCHA Problem
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
SACMAT
2009
ACM
15 years 6 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
IWANN
2009
Springer
15 years 6 months ago
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
Manuel García-Herranz, Pablo A. Haya, Xavie...
127
Voted
INFOCOM
2000
IEEE
15 years 6 months ago
RMX: Reliable Multicast for Heterogeneous Networks
—Although IP Multicast is an effective network primitive for best-effort, large-scale, multi-point communication, many multicast applications such as shared whiteboards, multi-pl...
Yatin Chawathe, Steven McCanne, Eric A. Brewer
SRDS
1999
IEEE
15 years 6 months ago
Logging and Recovery in Adaptive Software Distributed Shared Memory Systems
Software distributed shared memory (DSM) improves the programmability of message-passing machines and workclusters by providing a shared memory abstract (i.e., a coherent global a...
Angkul Kongmunvattana, Nian-Feng Tzeng