Sciweavers

9015 search results - page 1651 / 1803
» Using Structural Computing to Support Information Integratio...
Sort
View
114
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
HICSS
2003
IEEE
145views Biometrics» more  HICSS 2003»
15 years 7 months ago
The DISCIPLE System for Collaboration over the Heterogeneous Web
With the proliferation of mobile devices we witness an increasing demand for supporting collaboration among users working in the field and in the office. A key component for colla...
Allan Meng Krebs, Mihail F. Ionescu, Bogdan Doroho...
WMASH
2003
ACM
15 years 7 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
118
Voted
DIGRA
2003
Springer
15 years 7 months ago
From text to talk: multiplayer games and voiceover IP
The social experience of multiplayer gaming is mediated by the communications tools that are available to use. Until recently, these have been largely text-based, but with the adv...
John Halloran, Yvonne Rogers, Geraldine Fitzpatric...
CSFW
2010
IEEE
15 years 6 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
« Prev « First page 1651 / 1803 Last » Next »