Sciweavers

2358 search results - page 184 / 472
» A Secure Pervasive Environment
Sort
View
SAC
2002
ACM
13 years 8 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
CCGRID
2006
IEEE
14 years 3 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
14 years 23 days ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
APN
2008
Springer
13 years 11 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...