Sciweavers

343 search results - page 13 / 69
» The All-In Publication Policy
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
COMCOM
2000
79views more  COMCOM 2000»
14 years 9 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
15 years 1 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
CHI
2009
ACM
15 years 10 months ago
Bringing web 2.0 to government research: a case study
DASHlink is a public NASA research collaboration website. Web 2.0 style content generation and social software technologies along with a communitymoderated posting policy make it ...
Francesca A. Barrientos, Elizabeth A. Foughty, Daw...
78
Voted
SOUPS
2009
ACM
15 years 4 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...