Sciweavers

499 search results - page 55 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
CCS
2008
ACM
13 years 9 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
MABS
2004
Springer
14 years 1 months ago
Layering Social Interaction Scenarios on Environmental Simulation
For an integrated simulation such as the natural environment affected by human society, it is indispensable to provide an integrated simulator that incorporates multiple computatio...
Daisuke Torii, Toru Ishida, Stéphane Bonnea...
ICDCS
1997
IEEE
13 years 12 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava