Sciweavers

977 search results - page 62 / 196
» Soft Constraints for Security
Sort
View
COMPSAC
2007
IEEE
15 years 4 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 2 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 2 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 10 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
RECONFIG
2009
IEEE
165views VLSI» more  RECONFIG 2009»
15 years 4 months ago
Composable and Persistent-State Application Swapping on FPGAs Using Hardwired Network on Chip
—We envision that future FPGA will use a hardwired network on chip (HWNoC) [14] as a unified interconnect for functional communications (data and control) as well as configurat...
Muhammad Aqeel Wahlah, Kees G. W. Goossens