Sciweavers

1010 search results - page 128 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
SIGCOMM
1998
ACM
15 years 4 months ago
An Active Service Framework and Its Application to Real-Time Multimedia Transcoding
Several recent proposals for an “active networks” architecture advocate the placement of user-defined computation within the network as a key mechanism to enable a wide range...
Elan Amir, Steven McCanne, Randy H. Katz
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
GECCO
2005
Springer
134views Optimization» more  GECCO 2005»
15 years 5 months ago
Tracking extrema in dynamic environments using a coevolutionary agent-based model of genotype edition
Typical applications of evolutionary optimization in static environments involve the approximation of the extrema of functions. For dynamic environments, the interest is not to lo...
Chien-Feng Huang, Luis Mateus Rocha
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
16 years 4 days ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
EUROMICRO
2004
IEEE
15 years 3 months ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng