Sciweavers

1010 search results - page 158 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
EUROPAR
2006
Springer
14 years 1 months ago
A One-Stop, Fire-and-(Almost)Forget, Dropping-Off and Rendezvous Point
In order to foster uptake by scientific and business users we need an easy way to access Grid resources. This is the motivation for the A-WARE project. We build upon a fabric layer...
Roger Menday, Björn Hagemeier, Bernd Schuller...
ICDE
2007
IEEE
120views Database» more  ICDE 2007»
14 years 4 months ago
Support Concurrent Queries in Multiuser CBIR Systems
Various techniques have been developed for different query types in content-based image retrieval (CBIR) systems such as sampling queries, constrained sampling queries, multiple c...
Danzhou Liu, Kien A. Hua
LCN
2007
IEEE
14 years 4 months ago
Secure Anonymous Broadcasting in Vehicular Networks
—Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private. While the messages broadcast between vehicles and between...
Christine Laurendeau, Michel Barbeau
RAID
2007
Springer
14 years 4 months ago
Comparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Kenneth L. Ingham, Hajime Inoue
JIPS
2007
223views more  JIPS 2007»
13 years 10 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson