This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Abstract. We consider the problem of programming distributed embedded real-time systems with distributed dependencies. We show that the de facto standard of using locks and conditi...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Abstract. This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with re...
In this paper, we investigate the performance of an IEEE802.3 shared-bandwidth hub under a mixed data/real-time traffic load. For the regular data nodes we assume an exponentially...