Sciweavers

14824 search results - page 2616 / 2965
» Security - Introduction
Sort
View
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 8 months ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...
105
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 8 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
132
Voted
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 8 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
129
Voted
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 8 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
136
Voted
IUI
2010
ACM
15 years 8 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
« Prev « First page 2616 / 2965 Last » Next »