Sciweavers

6907 search results - page 36 / 1382
» Securing distributed adaptation
Sort
View
LCTRTS
2001
Springer
15 years 2 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 1 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
ESORICS
2009
Springer
15 years 2 months ago
Distributed Privacy-Preserving Methods for Statistical Disclosure Control
Javier Herranz, Jordi Nin, Vicenç Torra
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 3 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
PERCOM
2010
ACM
14 years 8 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...