Sciweavers

3751 search results - page 181 / 751
» Events in security protocols
Sort
View
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
DEBS
2010
ACM
15 years 4 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
PERCOM
2009
ACM
15 years 11 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
MOBILWARE
2009
ACM
15 years 10 months ago
Chapar: A Cross-Layer Overlay Event System for MANETs
Abstract. In this paper, we present Chapar, an event system designed for mobile ad hoc networks that supports the publish-subscribe model as well as pointto-point and point-to-mult...
Amir R. Khakpour, Isabelle M. Demeure
B
2007
Springer
15 years 10 months ago
Time Constraint Patterns for Event B Development
Distributed applications are based on algorithms which should be able to deal with time constraints. It is mandatory to express time constraints in (mathematical) models and the cu...
Dominique Cansell, Dominique Méry, Joris Re...