Sciweavers

364 search results - page 34 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
SIGDOC
2009
ACM
15 years 4 months ago
Modeling task experience in user assistance systems
One of the major issues for user assistance systems consists of “providing help at an appropriate level”. In this paper we analyze the problem of modeling task experience — ...
Andrea Kohlhase, Michael Kohlhase
SAC
2011
ACM
14 years 15 days ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
78
Voted
CCS
2007
ACM
15 years 3 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
SOUPS
2005
ACM
15 years 3 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
SACMAT
2009
ACM
15 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....