Sciweavers

2169 search results - page 215 / 434
» Mobile Processing in Open Systems
Sort
View
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
ICDCSW
2002
IEEE
15 years 10 months ago
Peer-to-Peer for Collaborative Applications
Peer-to-peer systems recently captured the attention of practitioners and researchers as they provide an attractive alternative to client-server architectures. Peerto-peer enables...
Gianpaolo Cugola, Gian Pietro Picco
CAISE
2003
Springer
15 years 10 months ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp
JSW
2007
106views more  JSW 2007»
15 years 4 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
WAIM
2010
Springer
15 years 3 months ago
HyperGraphDB: A Generalized Graph Database
We present HyperGraphDB, a novel graph database based on generalized hypergraphs where hyperedges can contain other hyperedges. This generalization automatically reifies every ent...
Borislav Iordanov