Sciweavers

9503 search results - page 7 / 1901
» Authenticated System Calls
Sort
View
77
Voted
CD
2004
Springer
15 years 2 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry
ICWS
2003
IEEE
14 years 11 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
89
Voted
ACISP
2010
Springer
14 years 11 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
MONET
2002
155views more  MONET 2002»
14 years 9 months ago
A Prioritized Real-Time Wireless Call Degradation Framework for Optimal Call Mix Selection
This paper describes a framework for selecting the optimal call mix to be admitted while employing a bandwidth degradation policy in a wireless cellular network. The optimal proper...
Gergely V. Záruba, Imrich Chlamtac, Sajal K...
CHI
2009
ACM
15 years 10 months ago
Can machines call people?: user experience while answering telephone calls initiated by machine
Current state-of?the-art spoken dialog systems are aimed at handling telephone calls to automate incoming caller requests. In this paper we explore a scenario which is symmetric t...
Adam J. Sporka, Jakub Franc, Giuseppe Riccardi