Sciweavers

116 search results - page 8 / 24
» Adding Control Integration to PCTE
Sort
View
CASES
2010
ACM
13 years 5 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
SIGMOD
2001
ACM
115views Database» more  SIGMOD 2001»
14 years 7 months ago
Efficient Evaluation of XML Middle-ware Queries
We address the problem of efficiently constructing materialized XML views of relational databases. In our setting, the XML view is specified by a query in the declarative query la...
Mary F. Fernandez, Atsuyuki Morishima, Dan Suciu
CAISE
2004
Springer
14 years 27 days ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
AINTEC
2006
Springer
13 years 11 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
NETWORKING
2008
13 years 9 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha