Sciweavers

6907 search results - page 224 / 1382
» Securing distributed adaptation
Sort
View
ATC
2006
Springer
15 years 6 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
15 years 10 months ago
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatical...
Yi C. Feng, Pong C. Yuen
IPCCC
2005
IEEE
15 years 9 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
ACSAC
1999
IEEE
15 years 8 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
SAFECOMP
1999
Springer
15 years 8 months ago
Formal Design of Distributed Control Systems with Lustre
During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...