Sciweavers

4731 search results - page 214 / 947
» Securing Interactive Programs
Sort
View
99
Voted
INFOSECCD
2006
ACM
15 years 8 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
15 years 7 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
CAISE
1999
Springer
15 years 6 months ago
A Multilevel Secure Workflow Management System
The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification l...
Myong H. Kang, Judith N. Froscher, Amit P. Sheth, ...
USM
2000
15 years 6 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
WSC
2004
15 years 3 months ago
A Template-Based Conceptual Modeling Infrastructure for Simulation of Physical Security Systems
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Ashu Guru, Paul A. Savory