Sciweavers

6164 search results - page 862 / 1233
» Teaching Computer Security
Sort
View
DSN
2005
IEEE
15 years 10 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
155
Voted
EGC
2005
Springer
15 years 10 months ago
Workflow-Oriented Collaborative Grid Portals
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals ...
Gergely Sipos, Gareth J. Lewis, Péter Kacsu...
138
Voted
EUC
2005
Springer
15 years 10 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...
ACMSE
2004
ACM
15 years 10 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
126
Voted
GCC
2004
Springer
15 years 10 months ago
Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. I...
Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Pe...