Sciweavers

1757 search results - page 235 / 352
» Secure Content Validation
Sort
View
DIMVA
2010
15 years 24 days ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
CADUI
2004
15 years 22 days ago
A Design Toolkit for Hypermedia Applications Based on Ariadne Development Method
The development process of hypermedia applications implies very specific problems mainly related, first, to the use of navigational structures, interactive behaviours and multimed...
Susana Montero, Camino Fernández, Juan Manu...
NETWORKING
2004
15 years 22 days ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
ATAL
2009
Springer
15 years 14 days ago
Towards an Architecture for Self-regulating Agents: A Case Study in International Trade
Abstract--Norm-enforcement models applied in human societies may serve as an inspiration for the design of multi-agent systems. Models for norm-enforcement in multi-agent systems o...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
CORR
2010
Springer
89views Education» more  CORR 2010»
14 years 11 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi