Sciweavers

6907 search results - page 379 / 1382
» Securing distributed adaptation
Sort
View
PPPJ
2004
ACM
15 years 10 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
OTM
2004
Springer
15 years 10 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 9 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
CSREASAM
2003
15 years 6 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
CORR
2011
Springer
169views Education» more  CORR 2011»
15 years 3 days ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip