Sciweavers

12637 search results - page 15 / 2528
» Security for Extensible Systems
Sort
View
121
Voted
COMPSAC
2005
IEEE
15 years 3 months ago
Efficiently Managing Security Concerns in Component Based System Design
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
125
Voted
AGENTS
2001
Springer
15 years 6 months ago
Scheduling multi-task multi-agent systems
We present a centralized and a distributed algorithms for scheduling multi-task agents in heterogeneous networks. Our centralized algorithm has an upper bound on the overall compl...
Rong Xie, Daniela Rus, Clifford Stein
SSWMC
2004
15 years 3 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
CAISE
2003
Springer
15 years 7 months ago
An Administration Console for the CSAP System
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
Fredj Dridi, Björn Muschall, Günther Per...
POLICY
2009
Springer
15 years 8 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...