Sciweavers

789 search results - page 26 / 158
» Pushing using Compliance
Sort
View
79
Voted
EDBT
2008
ACM
159views Database» more  EDBT 2008»
15 years 11 months ago
Deleting index entries from compliance storage
In response to regulatory focus on secure retention of electronic records, businesses are using magnetic disks configured as write-once read-many (WORM) compliance storage devices...
Soumyadeb Mitra, Marianne Winslett, Nikita Borisov
HRI
2006
ACM
15 years 5 months ago
Encouraging physical therapy compliance with a hands-Off mobile robot
This paper presents results toward our ongoing research program into hands-off assistive human-robot interaction [6]. Our work has focused on applications of socially assistive r...
Rachel Gockley, Maja J. Mataric
SEMWEB
2004
Springer
15 years 4 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
CCS
2006
ACM
15 years 2 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
GI
2009
Springer
14 years 8 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...