Sciweavers

1597 search results - page 280 / 320
» Mental Models of Computer Security
Sort
View
112
Voted
POLICY
2007
Springer
15 years 8 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
LCN
2006
IEEE
15 years 8 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
ESCIENCE
2005
IEEE
15 years 7 months ago
Experiences with GRIA - Industrial Applications on a Web Services Grid
The GRIA project set out to make the Grid usable by industry. The GRIA middleware is based on Web Services, and designed to meet the needs of industry for security and business-to...
Mike Surridge, Steve Taylor, David De Roure, Ed Za...
HT
2005
ACM
15 years 7 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
PADS
2005
ACM
15 years 7 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...