Sciweavers

1587 search results - page 261 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
AVSS
2008
IEEE
14 years 10 months ago
Multi-view Access Monitoring and Singularization in Interlocks
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...
PET
2004
Springer
15 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
HPDC
2005
IEEE
15 years 3 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
14 years 11 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 3 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer