Sciweavers

762 search results - page 64 / 153
» Security Contexts in Autonomic Systems
Sort
View
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 6 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
SRDS
1999
IEEE
15 years 4 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
ESORICS
2012
Springer
13 years 2 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
NCA
2006
IEEE
15 years 5 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
AIM
2006
14 years 12 months ago
Using 4D/RCS to Address AI Knowledge Integration
In this paper, we show how 4D/RCS incorporates and integrates multiple types of disparate knowledge representation techniques into a common, unifying architecture. 4D/RCS is based...
Craig Schlenoff, James S. Albus, Elena Messina, An...