Sciweavers

1597 search results - page 58 / 320
» Mental Models of Computer Security
Sort
View
CCGRID
2002
IEEE
15 years 6 months ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura
SIGITE
2005
ACM
15 years 7 months ago
Integration of information assurance and security into the IT2005 model curriculum
In this paper we present the context of the work of the Curriculum Committee on IT2005, the IT curriculum volume described in the Overview Draft document of the Joint Task Force f...
Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lun...
ICCV
2005
IEEE
15 years 7 months ago
A Study of Detecting Social Interaction with Sensors in a Nursing Home Environment
Social interaction plays an important role in our daily lives. It is one of the most important indicators of physical or mental diseases of aging patients. In this paper, we presen...
Datong Chen, Jie Yang, Howard D. Wactlar
IEEEIAS
2009
IEEE
15 years 8 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
IDTRUST
2010
ACM
15 years 8 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier