Sciweavers

2057 search results - page 75 / 412
» Distributed Secure Systems: Then and Now
Sort
View
119
Voted
JSW
2007
147views more  JSW 2007»
15 years 1 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
ENTCS
2002
120views more  ENTCS 2002»
15 years 27 days ago
Composition of Distributed Software with Algon - Concepts and Possibilities
The perceived advantages of distributed systems, such as increased reliability and availability, are o set by the increased complexity of developing such applications. The develop...
Judith Bishop, Karen Renaud, Basil Worrall
97
Voted
CCS
2006
ACM
15 years 4 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
89
Voted
JIPS
2010
110views more  JIPS 2010»
14 years 8 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
125
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 2 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson