Sciweavers

762 search results - page 66 / 153
» Security Contexts in Autonomic Systems
Sort
View
EDOC
2003
IEEE
15 years 5 months ago
A MOM-based Solution for Remote Monitoring of Equipment in Mines
Today’s autonomous and heterogeneous information systems have an increasing necessity of exchanging data. As widely known, middleware systems have been successfully adopted as i...
Virgínia A. C. Sgotti, Nelson S. Rosa, Well...
ICAC
2005
IEEE
15 years 5 months ago
Self-Configuring and Optimizing Mobile Ad Hoc Networks
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
ESORICS
2008
Springer
15 years 1 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
SP
1989
IEEE
15 years 3 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
MOBISYS
2009
ACM
16 years 12 days ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...