Sciweavers

1022 search results - page 77 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
FECS
2006
208views Education» more  FECS 2006»
14 years 11 months ago
Integral Learning Pedagogical Technique and Distance Learning applied in Laboratory Classes for Electrical and Computing Enginee
- This paper presents the results of a PhD thesis research, with an innovative proposal for the development of a Technical Laboratory Disciplines in Electrical and Computing Engine...
Paulo Alves Garcia, José Sidnei Colombo Mar...
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ACSAC
2007
IEEE
15 years 4 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
POLICY
2004
Springer
15 years 3 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
IOLTS
2002
IEEE
148views Hardware» more  IOLTS 2002»
15 years 2 months ago
Active Replication: Towards a Truly SRAM-Based FPGA On-Line Concurrent Testing
The reusing of the same hardware resources to implement speed-critical algorithms, without interrupting system operation, is one of the main reasons for the increasing use of reco...
Manuel G. Gericota, Gustavo R. Alves, Miguel L. Si...