Sciweavers

772 search results - page 62 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 11 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
DAC
2005
ACM
13 years 11 months ago
Cognitive radio techniques for wide area networks
The cellular wireless market has begun the transition to data centric services including high speed internet access, video, high quality audio, and gaming. Communications technolo...
William Krenik, Anuj Batra
GLOBECOM
2006
IEEE
14 years 3 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
JUCS
2010
132views more  JUCS 2010»
13 years 7 months ago
A Mobile Intelligent Interruption Management System
: Mobile phones have become the most hated device that people cannot live without. For its primary usage as a communication device, it has surpassed any other medium. But it comes ...
Sina Zulkernain, Praveen Madiraju, Sheikh Iqbal Ah...
ACSAC
2006
IEEE
14 years 3 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...