Sciweavers

675 search results - page 129 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ESWS
2010
Springer
13 years 8 months ago
OKBook: Peer-to-Peer Community Formation
Many systems exist for community formation in extensions of traditional Web environments but little work has been done for forming and maintaining communities in the more dynamic e...
Xi Bai, Wamberto Vasconcelos, Dave Robertson
RAID
2009
Springer
14 years 1 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
PERCOM
2003
ACM
14 years 7 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste
ICAC
2006
IEEE
14 years 1 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...