Sciweavers

6192 search results - page 216 / 1239
» Distributed Control of Attention
Sort
View
117
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Updates and Asynchronous Communication in Trusted Computing Systems
Software-based usage controls typically are vulnerable to attacks. Trusted Platform Modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM...
José Carlos Brustoloni, David Kyle
128
Voted
PRDC
2007
IEEE
15 years 10 months ago
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also ...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
139
Voted
COLCOM
2009
IEEE
15 years 8 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
COOPIS
2002
IEEE
15 years 8 months ago
A Decentralized Algorithm for Coordinating Independent Peers: An Initial Examination
Abstract. Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attrac...
Girish Suryanarayana, Richard N. Taylor
165
Voted
CN
2006
124views more  CN 2006»
15 years 3 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini