Sciweavers

6907 search results - page 256 / 1382
» Securing distributed adaptation
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
15 years 2 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
MM
2004
ACM
154views Multimedia» more  MM 2004»
15 years 10 months ago
Web services selection for distributed composition of multimedia content
Growing numbers of pervasive devices are gaining access to the Internet. However, much of the existing rich multimedia content cannot be handled by mobile client devices with limi...
Matthias Wagner, Wolfgang Kellerer
SSR
2001
104views more  SSR 2001»
15 years 5 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
ISORC
1999
IEEE
15 years 8 months ago
An Adaptive Scheduling Approach in Real-Time CORBA
CORBA is an emerging middleware infrastructure with open standardization that is receiving a good acceptance since it makes easier to program distributed objects. CORBA is being e...
Carlos Montez, Joni da Silva Fraga, Jean-Marie Far...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 11 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...