Sciweavers

762 search results - page 2 / 153
» Security Contexts in Autonomic Systems
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
13 years 11 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
CSREASAM
2008
13 years 6 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé
ATC
2006
Springer
13 years 8 months ago
Towards a Standards-Based Autonomic Context Management System
Abstract. Pervasive computing applications must be sufficiently autonomous to adapt their behaviour to changes in computing resources and user requirements. This capability is know...
Jadwiga Indulska, Karen Henricksen, Peizhao Hu
ECAI
2008
Springer
13 years 6 months ago
Using Rules for the Integration of Heterogeneous and Autonomous, Context-Aware Systems
In this paper we introduce NUBIA, a middleware that combines, through business rules, information generated by heterogeneous and autonomous systems. Communication between NUBIA and...
David Mosén, Arantza Illarramendi, Mohand-S...
ICEIS
2010
IEEE
13 years 2 months ago
Context-Policy-Configuration - Paradigm of Intelligent Autonomous System Creation
Oleksiy Khriyenko, Sergiy Nikitin, Vagan Y. Terziy...