Sciweavers

2652 search results - page 58 / 531
» When Information Improves Information Security
Sort
View
MOBILITY
2009
ACM
15 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
INFOCOM
2005
IEEE
15 years 3 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
156
Voted
SIGMOD
2008
ACM
123views Database» more  SIGMOD 2008»
15 years 10 months ago
Query-based partitioning of documents and indexes for information lifecycle management
Regulations require businesses to archive many electronic documents for extended periods of time. Given the sheer volume of documents and the response time requirements, documents...
Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu
BMCBI
2007
140views more  BMCBI 2007»
14 years 9 months ago
Accurate prediction of protein secondary structure and solvent accessibility by consensus combiners of sequence and structure in
Background: Structural properties of proteins such as secondary structure and solvent accessibility contribute to three-dimensional structure prediction, not only in the ab initio...
Gianluca Pollastri, Alberto J. M. Martin, Catherin...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 3 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White