Sciweavers

621 search results - page 43 / 125
» Security of Internet Location Management
Sort
View
GAMESEC
2011
344views Game Theory» more  GAMESEC 2011»
14 years 1 months ago
Aegis A Novel Cyber-Insurance Model
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means suc...
Ranjan Pal, Leana Golubchik, Konstantinos Psounis
SIGMETRICS
2002
ACM
133views Hardware» more  SIGMETRICS 2002»
15 years 1 months ago
On the stability of network distance estimation
Estimating end-to-end Internet distance can benefit many applications and services, such as efficient overlay construction, overlay routing and location, and peer-topeer systems. ...
Yan Chen, Khian Hao Lim, Randy H. Katz, Chris Over...
SACMAT
2004
ACM
15 years 7 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
NOMS
2006
IEEE
15 years 8 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
PAAMS
2010
Springer
14 years 12 months ago
Agents to Help Context-Aware System in Home Care
Context-aware systems capture information from the attributes located within their surroundings and deal with different ways of interacting with the user in its environment. This p...
Juan A. Fraile, Dante I. Tapia, Jesús A. Ro...