Sciweavers

2517 search results - page 70 / 504
» Secure Deployment of Components
Sort
View
AAAI
2000
15 years 4 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
JSAC
2007
93views more  JSAC 2007»
15 years 3 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
GCC
2009
Springer
15 years 1 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
CACM
2002
77views more  CACM 2002»
15 years 3 months ago
Security considerations for remote electronic voting
This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections ...
Aviel D. Rubin
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 6 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek