Sciweavers

2281 search results - page 289 / 457
» Security Patterns and Secure Systems Design
Sort
View
IEEEARES
2010
IEEE
15 years 10 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
SIGCOMM
2004
ACM
15 years 9 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
IEEEARES
2006
IEEE
15 years 10 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai
AGENTS
2001
Springer
15 years 8 months ago
Tears and fears: modeling emotions and emotional behaviors in synthetic agents
Emotions play a critical role in creating engaging and believable characters to populate virtual worlds. Our goal is to create general computational models to support characters t...
Jonathan Gratch, Stacy Marsella
ESORICS
2008
Springer
15 years 5 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...