Sciweavers

6907 search results - page 906 / 1382
» Securing distributed adaptation
Sort
View
117
Voted
AGENTS
1997
Springer
15 years 8 months ago
SAIRE - A Scalable Agent-Based Information Retrieval Engine
The information access and retrieval capabilities provided by several conventional search engines, while improving upon traditional techniques, are lacking in supporting conceptua...
Jidé B. Odubiyi, David J. Kocur, Stuart M. ...
133
Voted
ESORICS
2006
Springer
15 years 7 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
EUROPKI
2006
Springer
15 years 7 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
147
Voted
ATAL
2003
Springer
15 years 7 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
SAFECOMP
2000
Springer
15 years 7 months ago
Assessment of the Reliability of Fault-Tolerant Software: A Bayesian Approach
Fault tolerant systems based on the use of software design diversity may be able to achieve high levels of reliability more cost-effectively than other approaches, such as heroic ...
Bev Littlewood, Peter T. Popov, Lorenzo Strigini