Sciweavers

1456 search results - page 176 / 292
» The Layer-Independent Descriptor Concept
Sort
View
91
Voted
SAC
2004
ACM
15 years 6 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
91
Voted
SAC
2004
ACM
15 years 6 months ago
A Ubiquitous Computing environment for aircraft maintenance
Ubiquitous Computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for havi...
Matthias Lampe, Martin Strassner, Elgar Fleisch
85
Voted
SAC
2004
ACM
15 years 6 months ago
A relational approach to software metrics
There is still no standardization of software measures and metrics extraction tools have to be updated frequently to handle the changes. A possible solution is represented by usin...
Marco Scotto, Alberto Sillitti, Giancarlo Succi, T...
100
Voted
SACMAT
2004
ACM
15 years 6 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
99
Voted
SENSYS
2004
ACM
15 years 6 months ago
A sensor network application construction kit (SNACK)
We propose a new configuration language, component and service library, and compiler that make it easier to develop efficient sensor network applications. Our goal is the constr...
Ben Greenstein, Eddie Kohler, Deborah Estrin