Sciweavers

29 search results - page 3 / 6
» The Power of the Defender
Sort
View
PERCOM
2007
ACM
14 years 6 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 5 hour ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
ACSAC
2006
IEEE
14 years 17 days ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
CSE
2009
IEEE
14 years 1 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
COSIT
2001
Springer
128views GIS» more  COSIT 2001»
13 years 11 months ago
True Grid
The Renaissance architect, moral philosopher, cryptographer, mathematician, Papal adviser, painter, city planner and land surveyor Leon Battista Alberti provided the theoretical fo...
Barry Smith