Sciweavers

1748 search results - page 9 / 350
» Security Models for Heterogeneous Networking
Sort
View
89
Voted
CSFW
1999
IEEE
15 years 4 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
ICNP
2006
IEEE
15 years 5 months ago
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks
Zhongmei Yao, Derek Leonard, Xiaoming Wang, Dmitri...
103
Voted
ACSAC
2000
IEEE
15 years 4 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
100
Voted
IJSN
2007
120views more  IJSN 2007»
14 years 11 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
AINA
2007
IEEE
15 years 6 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang