Sciweavers

981 search results - page 154 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
SAC
2008
ACM
15 years 27 days ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
RTAS
1996
IEEE
15 years 5 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
CCIA
2007
Springer
15 years 7 months ago
An Argument-Based Approach to Deal with Wastewater Discharges
: In this paper we propose the use of an argument-based model – ProCLAIM – that has the potential to minimize ecological impact of industrial wastewater discharges into water b...
Montse Aulinas, Pancho Tolchinsky, Clàudia ...
SACMAT
2003
ACM
15 years 6 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
CCS
2010
ACM
15 years 1 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...