Sciweavers

73 search results - page 4 / 15
» PeerAccess: a logic for distributed authorization
Sort
View
EJWCN
2010
122views more  EJWCN 2010»
14 years 4 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
ESSOS
2011
Springer
14 years 29 days ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
IPPS
1998
IEEE
15 years 1 months ago
Modeling and Validation Support for Interactive Networked Multimedia Applications
This work presents MUSE, a graphical environment for modeling interactive networked multimedia applications. Through an advanced graphic interface and a new highlevel authoring mod...
Luciano Paschoal Gaspary, Maria Janilce B. Almeida
PET
2012
Springer
12 years 12 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
ACSAC
1999
IEEE
15 years 1 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely