Sciweavers

359 search results - page 27 / 72
» Supporting Real World Security Models in Java
Sort
View
ICICS
2010
Springer
15 years 16 days ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
CCS
2006
ACM
15 years 6 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
WOA
2007
15 years 3 months ago
Agents and Security in a Cultural Assets Transport Scenario
Abstract— Museums and exhibitions represent a relevant contribution to the economy all over the world. In Italy, in the year 2006 the 400 national museums, monuments and archaeol...
Stefania Costantini, Arianna Tocchio, Panagiota Ts...
123
Voted
TOIT
2008
115views more  TOIT 2008»
15 years 2 months ago
Resource space model, OWL and database: Mapping and integration
s exhibits diversity in the real world, mental abstraction world, document world, and machine world. Studying mappings between different forms of semantics helps unveil the uniform...
Hai Zhuge, Yunpeng Xing, Peng Shi
135
Voted
PERCOM
2003
ACM
16 years 2 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure