Sciweavers

486 search results - page 62 / 98
» policy 2005
Sort
View
ISPEC
2005
Springer
15 years 3 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
MADNES
2005
Springer
15 years 3 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
PROMAS
2005
Springer
15 years 3 months ago
Implementing Multi-agent Systems Organizations with INGENIAS
In a multi-agent system, the organization determines the architecture of the whole system, and the way and policies for agent collaboration and interactions. Although this is a key...
Jorge J. Gómez-Sanz, Juan Pavón
TGC
2005
Springer
15 years 3 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
TGC
2005
Springer
15 years 3 months ago
A Practical Formal Model for Safety Analysis in Capability-Based Systems
Abstract. We present a formal system that models programmable abstractions for access control. Composite abstractions and patterns of arbitrary complexity are modeled as a configu...
Fred Spiessens, Peter Van Roy