Sciweavers

595 search results - page 99 / 119
» New architecture for intra-domain network security issues
Sort
View
126
Voted
SACMAT
2004
ACM
15 years 7 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 7 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
110
Voted
USENIX
2004
15 years 3 months ago
How Xlib Is Implemented (and What We're Doing About It)
The X Window System is the de facto standard graphical environment for Linux and Unix hosts, and is usable on nearly any class of computer one could find today. Its success is par...
Jamey Sharp
134
Voted
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 7 months ago
A Framework for Self-Optimizing Grids Using P2P Components
We present the framework of a new grid architecture based on the peer-to-peer and the component paradigms. In our architecture, several peer-to-peer components are loosely coupled...
Florian Schintke, Thorsten Schütt, Alexander ...
MOBICOM
2005
ACM
15 years 7 months ago
Challenges: communication through silence in wireless sensor networks
Wireless sensor networks (WSNs) are typically characterized by a limited energy supply at sensor nodes. Hence, energy efficiency is an important issue in the system design and op...
Yujie Zhu, Raghupathy Sivakumar