Sciweavers

573 search results - page 62 / 115
» The Policy Machine for Security Policy Management
Sort
View
CISIS
2010
IEEE
15 years 4 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
ICAC
2007
IEEE
15 years 4 months ago
Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on c...
Balasubramanian Seshasayee, Ripal Nathuji, Karsten...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 4 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
SEC
2007
14 years 11 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat
GLOBECOM
2008
IEEE
15 years 4 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren