Sciweavers

6907 search results - page 220 / 1382
» Securing distributed adaptation
Sort
View
CCS
2008
ACM
15 years 5 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
144
Voted
ICMCS
2000
IEEE
115views Multimedia» more  ICMCS 2000»
15 years 7 months ago
Adaptive Reservation: A New Framework for Multimedia Adaptation
— Research on multimedia adaptation usually assumes undifferentiated, best-effort service from the network, and relies on signaling mechanisms such as packet loss rates for feedb...
Xin Wang, Henning Schulzrinne
GLOBECOM
2009
IEEE
15 years 10 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
DSRT
2008
IEEE
15 years 9 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 8 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini