Sciweavers

5273 search results - page 926 / 1055
» Secured Web Access
Sort
View
ERSA
2006
102views Hardware» more  ERSA 2006»
15 years 5 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 5 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King
ISSA
2004
15 years 5 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ECIS
2003
15 years 5 months ago
Adoption trends in application service provisioning: an exploratory field study of small and medium-size enterprises
This paper describes an exploratory field study on the adoption of Application Service Provisioning (ASP) in Small and Medium-sized Enterprises (SMEs). Rooted in Merton’s Motiva...
Ryan Peterson, Alea M. Fairchild
EUROSSC
2008
Springer
15 years 5 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...