Sciweavers

4511 search results - page 544 / 903
» Observation Based System Security
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying
Abstract—We consider the problem of jointly optimizing channel pairing, channel-user assignment, and power allocation in a single-relay multiple-access system. The optimization o...
Mahdi Hajiaghayi, Min Dong, Ben Liang
WORDS
2005
IEEE
15 years 10 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
15 years 10 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
ACSAC
2006
IEEE
15 years 8 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
201
Voted
COMPSAC
2004
IEEE
15 years 8 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...