Sciweavers

781 search results - page 81 / 157
» An Integrated Model for Hybrid Securities
Sort
View
COMPSEC
2000
112views more  COMPSEC 2000»
13 years 8 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 29 days ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
SIGCOMM
2010
ACM
13 years 9 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 8 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
AI
2011
Springer
13 years 3 months ago
Local closed world reasoning with description logics under the well-founded semantics
An important question for the upcoming Semantic Web is how to best combine open world ontology languages, such as the OWL-based ones, with closed world rule-based languages. One o...
Matthias Knorr, José Júlio Alferes, ...