Sciweavers

573 search results - page 87 / 115
» The Policy Machine for Security Policy Management
Sort
View
AISS
2010
165views more  AISS 2010»
14 years 7 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
CCS
2005
ACM
15 years 3 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
WWW
2004
ACM
15 years 10 months ago
OREL: an ontology-based rights expression language
This paper proposes an Ontology-based Rights Expression Language, called OREL. Based on OWL Web Ontology Language, OREL allows not only users but also machines to handle digital r...
Yuzhong Qu, Xiang Zhang, Huiying Li
CJ
2002
122views more  CJ 2002»
14 years 9 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
DSOM
2007
Springer
15 years 3 months ago
Efficient Web Services Event Reporting and Notifications by Task Delegation
Web Services are an XML technology recently viewed as capable of being used for network management. A key aspect of WS in this domain is event reporting. WS-based research in this ...
Aimilios Chourmouziadis, George Pavlou