Sciweavers

434 search results - page 45 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
SASO
2007
IEEE
14 years 3 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
CRISIS
2009
13 years 6 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...
ICDCS
2007
IEEE
14 years 3 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 3 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
TITS
2010
201views Education» more  TITS 2010»
13 years 3 months ago
A Review of the Applications of Agent Technology in Traffic and Transportation Systems
The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of largescale distributed systems to deal with the uncertainty in a dynamic...
Bo Chen, Harry H. Cheng