Sciweavers

6137 search results - page 229 / 1228
» Securing Collaborative Applications
Sort
View
117
Voted
COLCOM
2007
IEEE
15 years 4 months ago
Maintaining constraints expressed as formulas in collaborative systems
—Constraints allow users to declare relationships among objects and let the constraint systems maintain and satisfy these relationships. Formulas have been adopted to express con...
Kai Lin, David Chen, R. Geoff Dromey, Chengzheng S...
86
Voted
CADE
2008
Springer
16 years 2 months ago
Challenges in the Automated Verification of Security Protocols
Abstract. The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
Hubert Comon-Lundh
PUC
2006
72views more  PUC 2006»
15 years 2 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
131
Voted
ISORC
2008
IEEE
15 years 9 months ago
On Collaborative Scheduling of Distributable Real-Time Threads in Dynamic, Networked Embedded Systems
Some emerging networked embedded real-time applications have relatively long reaction time magnitudes—e.g., milliseconds to minutes. These longer execution time magnitudes allow...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
125
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 9 months ago
Design of Collaborative Codes Achieving Space-Time Diversity
— In wireless networks, the use of collaboration has been shown to provide an increase in reliability due to an increase in diversity. Specifically it has been shown that by havi...
Patrick Tooher, Hesam Khoshneviss, M. Reza Soleyma...