Sciweavers

762 search results - page 72 / 153
» Security Contexts in Autonomic Systems
Sort
View
DEON
2008
Springer
15 years 1 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
WIS
2003
15 years 1 months ago
An Agent-Based Architecture for Wireless Bus Travel Assistants
Multi-agent systems are open and extensible systems that allow for the deployment of autonomous and proactive software components. This paper describes how a multi-agent architectu...
Robin Strahan, Conor Muldoon, Gregory M. P. O'Hare...
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
STORAGESS
2006
ACM
15 years 5 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
ATAL
2008
Springer
15 years 1 months ago
Electronic contracting in aircraft aftercare: a case study
Distributed systems comprised of autonomous self-interested entities require some sort of control mechanism to ensure the predictability of the interactions that drive them. This ...
Felipe Rech Meneguzzi, Simon Miles, Michael Luck, ...