Sciweavers

249 search results - page 49 / 50
» Validating a Web Service Security Abstraction by Typing
Sort
View
EUMAS
2006
13 years 7 months ago
Agents Arguing over Ontology Alignments
ed Abstract Ontologies play an important role in inter-agent communication, by providing the definitions of the vocabularies used by agents to describe the world [4]. An agent can ...
Loredana Laera, Valentina A. M. Tamma, Jér&...
PLDI
2003
ACM
13 years 11 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
MOBIWAC
2009
ACM
14 years 25 days ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
USENIX
2003
13 years 7 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
INFOCOM
2003
IEEE
13 years 11 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin