Sciweavers

1266 search results - page 37 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJAR
2008
119views more  IJAR 2008»
14 years 12 months ago
Adapting Bayes network structures to non-stationary domains
When an incremental structural learning method gradually modifies a Bayesian network (BN) structure to fit observations, as they are read from a database, we call the process stru...
Søren Holbech Nielsen, Thomas D. Nielsen
COLCOM
2009
IEEE
15 years 4 months ago
The Quality Social Network: A collaborative environment for personalizing Web access
—In this paper, we present a collaborative social networking environment, referred to as Quality Social Network (QSN), which enhances the social tagging paradigm by using it as a...
Andrea Perego, Barbara Carminati, Elena Ferrari
POLICY
2007
Springer
15 years 6 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
IPPS
2008
IEEE
15 years 6 months ago
Resource allocation in a client/server hybrid network for virtual world environments
The creation of a virtual world environment (VWE) has significant costs, such as maintenance of server rooms, server administration, and customer service. The initial development...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters