Sciweavers

3420 search results - page 629 / 684
» A Language-Based Approach to Security
Sort
View
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 8 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
TCS
2008
13 years 8 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TIP
2008
165views more  TIP 2008»
13 years 8 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
JNW
2007
113views more  JNW 2007»
13 years 8 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
JSAC
2007
93views more  JSAC 2007»
13 years 8 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...