Sciweavers

2358 search results - page 313 / 472
» A Secure Pervasive Environment
Sort
View
OOPSLA
2009
Springer
15 years 11 months ago
TROPIC: a framework for model transformations on petri nets in color
Model transformation languages, the cornerstone of Modelngineering, often lack mechanisms for abstraction, reuse and debugging. We propose a model transformation k providing diffe...
Manuel Wimmer, Gerti Kappel, Johannes Schönb&...
IEEEARES
2008
IEEE
15 years 11 months ago
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors
—Failure detectors are a fundamental part of safe fault-tolerant distributed systems. Many failure detectors use heartbeats to draw conclusions about the state of nodes within a ...
Benjamin Satzger, Andreas Pietzowski, Wolfgang Tru...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 11 months ago
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
Huafei Zhu, Feng Bao
ICON
2007
IEEE
15 years 11 months ago
A Study of the TKIP Cryptographic DoS Attack
—Wireless networks, especially those based on 802.11, have found widespread use in domestic, commercial, educational, military and public-safety environments. The security of the...
Stephen Mark Glass, Vallipuram Muthukkumarasamy
WETICE
2007
IEEE
15 years 11 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi