Sciweavers

981 search results - page 146 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
LISA
2007
15 years 3 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 7 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
EUROSSC
2006
Springer
15 years 5 months ago
Infrastructural Support for Dynamic Context Bindings
Abstract. Research in context-aware systems shows that using context information enables the development of personalized mobile applications. The context acquisition process in a c...
Tom Broens, Aart van Halteren, Marten van Sinderen
ATAL
2005
Springer
15 years 7 months ago
Formalization of a voting protocol for virtual organizations
A voting protocol for decision-making in virtual organizations is presented. In an agent-based virtual organization the functions of formation, management and dissolution of the o...
Jeremy V. Pitt, Lloyd Kamara, Marek J. Sergot, Ale...
CASES
2005
ACM
15 years 3 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...