Sciweavers

981 search results - page 110 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 6 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
JNW
2008
164views more  JNW 2008»
15 years 1 months ago
Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks
The distributed nature of peer-to-peer networks offers a solid ground for the deployment of environments where multiple agents, managing several resources, can cooperate in pursuin...
António Luis Lopes, Luís Miguel Bote...
IAW
2003
IEEE
15 years 6 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
MOBISYS
2007
ACM
16 years 1 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
106
Voted
AAAI
1994
15 years 2 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...