Sciweavers

981 search results - page 101 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CN
1999
74views more  CN 1999»
15 years 1 months ago
FIPA-compliant agents for real-time control of Intelligent Network traffic
Autonomy, adaptability, scalability, and flexible communications are all attributes of agents and multi-agent systems which suggest that they may offer timely solutions for dealin...
Brendan Jennings, Rob Brennan, Rune Gustavsson, Ro...
105
Voted
CCS
2006
ACM
15 years 5 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
ACSAC
2003
IEEE
15 years 6 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
ICPPW
2003
IEEE
15 years 6 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
JVA
2006
IEEE
15 years 7 months ago
Dependability in Hybrid Grid Systems: A Virtual Clusters Approach
With the rapid evolution of mobile and ubiquitous computing, small-scale devices like personal digital assistants, smart "converged" phones and laptops now dominate the ...
Stavros Isaiadis, Vladimir Getov