Sciweavers

653 search results - page 66 / 131
» Addressing interoperability issues in access control models
Sort
View
JSAC
2011
142views more  JSAC 2011»
14 years 7 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
112
Voted
AROBOTS
2004
131views more  AROBOTS 2004»
15 years 14 days ago
Evolving Self-Organizing Behaviors for a Swarm-Bot
In this paper, we introduce a self-assembling and self-organizing artifact, called a swarm-bot, composed of a swarm of s-bots, mobile robots with the ability to connect to and to ...
Marco Dorigo, Vito Trianni, Erol Sahin, Roderich G...
124
Voted
SOUPS
2005
ACM
15 years 6 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
HPDC
1999
IEEE
15 years 4 months ago
Resource Co-Allocation in Computational Grids
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
Karl Czajkowski, Ian T. Foster, Carl Kesselman
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 21 days ago
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independ...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...