Sciweavers

422 search results - page 66 / 85
» Risk management for distributed authorization
Sort
View
62
Voted
CIKM
2008
Springer
15 years 2 months ago
Efficient techniques for document sanitization
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader audience. Such sanitization is needed while declas...
Venkatesan T. Chakaravarthy, Himanshu Gupta, Prasa...
103
Voted
IC
2004
15 years 2 months ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews
DOA
2001
94views more  DOA 2001»
15 years 2 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
124
Voted
EICS
2010
ACM
15 years 26 days ago
Seamless integration of heterogeneous UI components
Component-based software engineering is a paradigm aiming at better ways to reuse existing code and to distribute work across teams. Integrating UI components developed with diffe...
Heiko Paulheim, Atila Erdogan
99
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 23 days ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta