Sciweavers

24 search results - page 4 / 5
» Declarative Reconfigurable Trust Management
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 days ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
ITCC
2005
IEEE
13 years 11 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
ICSE
1998
IEEE-ACM
13 years 9 months ago
Exploiting an Event-Based Infrastructure to Develop Complex Distributed Systems
The development of complex distributed systems demands for the creation of suitable architectural styles (or paradigms) and related run-time infrastructures. An emerging style tha...
Gianpaolo Cugola, Elisabetta Di Nitto, Alfonso Fug...
VLDB
2004
ACM
106views Database» more  VLDB 2004»
13 years 11 months ago
Vision Paper: Enabling Privacy for the Paranoids
P3P [23, 24] is a set of standards that allow corporations to declare their privacy policies. Hippocratic Databases [6] have been proposed to implement such policies within a corp...
Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hec...
EUC
2004
Springer
13 years 11 months ago
Securing Communications in the Smart Home
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
Patroklos G. Argyroudis, Donal O'Mahony