Sciweavers

6907 search results - page 61 / 1382
» Securing distributed adaptation
Sort
View
APSEC
2006
IEEE
15 years 3 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 4 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
ICDCN
2009
Springer
15 years 2 months ago
Rate Adaptive Channel MAC
A novel ‘Rate adaptive Channel MAC paradigm’ has been proposed considering perfect channel prediction and optimal rate adaptation. Simulation results reveal a significant perf...
Manzur Ashraf, Aruna Jayasuriya
ACSAC
2004
IEEE
15 years 1 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
EEE
2004
IEEE
15 years 1 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee