Sciweavers

2572 search results - page 496 / 515
» Identification in Ad Hoc Networks
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
HPCC
2007
Springer
15 years 5 months ago
FTSCP: An Efficient Distributed Fault-Tolerant Service Composition Protocol for MANETs
Abstract. Service composition, which enables users to construct complex services from atomic services, is an essential feature for the usability of Mobile Ad hoc Networks (MANETs)....
Zhen-guo Gao, Sheng Liu, Ming Ji, Jinhua Zhao, Lih...
128
Voted
ESORICS
2000
Springer
15 years 5 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
HPDC
1997
IEEE
15 years 5 months ago
A Directory Service for Configuring High-Performance Distributed Computations
High-performance execution in distributed computing environments often requires careful selection and configuration not only of computers, networks, and other resources but also o...
Steven Fitzgerald, Ian T. Foster, Carl Kesselman, ...
108
Voted
ESWS
2010
Springer
15 years 3 months ago
OKBook: Peer-to-Peer Community Formation
Many systems exist for community formation in extensions of traditional Web environments but little work has been done for forming and maintaining communities in the more dynamic e...
Xi Bai, Wamberto Vasconcelos, Dave Robertson