Sciweavers

2904 search results - page 78 / 581
» Internet Infrastructure Security
Sort
View
IPCCC
2006
IEEE
15 years 7 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
NOMS
2006
IEEE
15 years 7 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
DSOM
2004
Springer
15 years 6 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
131
Voted
AGENTS
2001
Springer
15 years 6 months ago
Every agent a web server, every agent community an intranet..
The research community is struggling with the right approach to integrate emerging agent technology with the exploding web page-based Internet. This paper presents the approach us...
Marshall Brinn, Todd M. Carrico, Nathan Combs
AGENTS
2001
Springer
15 years 6 months ago
Automated negotiation from declarative contract descriptions
We present and implement an infrastructure for automating the negotiation of business contracts. Underlying our system is a declarative language for both (1) fully-specified, exe...
Daniel M. Reeves, Michael P. Wellman, Benjamin N. ...