Sciweavers

5273 search results - page 207 / 1055
» Secured Web Access
Sort
View
CORR
2000
Springer
100views Education» more  CORR 2000»
15 years 4 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
140
Voted
AIME
2005
Springer
15 years 10 months ago
Web Mining Techniques for Automatic Discovery of Medical Knowledge
In this paper, we propose an automatic and autonomous methodology to discover taxonomies of terms from the Web and represent retrieved web documents into a meaningful organization....
David Sánchez, Antonio Moreno
137
Voted
EDOC
2005
IEEE
15 years 10 months ago
An Interactive Approach for Specifying OWL-S Groundings
12 OWL-S is an instance of the Web Ontology Language (OWL) that is used to describe and specify semantic web services. While OWL-S provides a promising mechanism for specification...
Gerald C. Gannod, Raynette J. Brodie, John T. E. T...
TC
1998
15 years 4 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
ESCIENCE
2006
IEEE
15 years 10 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...