Sciweavers

2337 search results - page 102 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
FC
2007
Springer
119views Cryptology» more  FC 2007»
15 years 4 months ago
Improving Usability by Adding Security to Video Conferencing Systems
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...
April Slayden Mitchell, Alan H. Karp
SOSP
2007
ACM
15 years 7 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 1 months ago
Language communities in enterprise architecture research
As a result of the rigor vs. relevance debate, researchers who focus on design research on organizational problems are beginning to focus on their research methodology’s rigor. ...
Joachim Schelp, Robert Winter
SPC
2005
Springer
15 years 3 months ago
Security Issues for Pervasive Personalized Communication Systems
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
Bertin Klein, Tristan Miller, Sandra Zilles
WWW
2003
ACM
15 years 10 months ago
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval
We consider the problem of building a P2P-based search engine for massive document collections. We describe a prototype system called ODISSEA (Open DIStributed Search Engine Archi...
Torsten Suel, Chandan Mathur, Jo-wen Wu, Jiangong ...