Sciweavers

3335 search results - page 540 / 667
» Grid result checking
Sort
View
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 9 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
FOSSACS
2003
Springer
15 years 9 months ago
When Ambients Cannot Be Opened
rized Verification by Probabilistic Abstraction . . . . . . . . . . . . . . . . 87 Tamarah Arons, Amir Pnueli, Lenore Zuck Genericity and the π-Calculus . . . . . . . . . . . . ....
Iovka Boneva, Jean-Marc Talbot
IPSN
2003
Springer
15 years 9 months ago
Sentry-Based Power Management in Wireless Sensor Networks
This paper presents a sentry-based approach to power management in wireless sensor networks for applications such as intruder detection and tracking. To minimize average power cons...
Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh
ACSAC
2002
IEEE
15 years 9 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
131
Voted
ACSC
2002
IEEE
15 years 9 months ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...