Sciweavers

77 search results - page 11 / 16
» Ontologies to Support Call Control Policies
Sort
View
CODES
2005
IEEE
15 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SEC
2007
14 years 11 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
COORDINATION
2000
Springer
15 years 1 months ago
Law-Governed Internet Communities
We consider the problem of coordination and control of large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction (LGI) [2, 5]. L...
Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen, Victor...
ACSAC
1997
IEEE
15 years 1 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
NGC
2006
Springer
140views Communications» more  NGC 2006»
14 years 9 months ago
Re-representation and Creative Analogy: A Lexico-semantic Perspective
Analogy is a powerful boundary-transcending process that exploits a conceptual system's ability to perform controlled generalization in one domain and re-specialization into ...
Tony Veale