Sciweavers

2422 search results - page 447 / 485
» Security Policy Consistency
Sort
View
DISCEX
2003
IEEE
15 years 3 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
IAW
2003
IEEE
15 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
72
Voted
ELPUB
2003
ACM
15 years 3 months ago
Building a Federated, Online Social Sciences and Humanities Database of Journals and Research Communication: A Canadian Initiati
: Synergies is an emerging online Canadian publishing project in the social sciences and humanities that builds on a group of online publishing initiatives that have emerged over t...
Rowland Lorimer, Richard Smith
SIGUCCS
2003
ACM
15 years 2 months ago
Liberating lab computing: building a stable yet flexible computing environment for students and faculty
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
Kenneth Janz, Pei-Yi Hu
WMASH
2003
ACM
15 years 2 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...