Sciweavers

2335 search results - page 120 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
WSC
2004
15 years 6 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
ETRICS
2006
15 years 8 months ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl
IJNSEC
2006
112views more  IJNSEC 2006»
15 years 4 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao

Book
688views
17 years 3 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
143
Voted
IRI
2006
IEEE
15 years 11 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss