Sciweavers

480 search results - page 91 / 96
» Anonymous Transactions in Computer Networks
Sort
View
IPPS
2003
IEEE
14 years 23 days ago
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
In this paper we propose a novel architecture, CARD, for resource discovery in large scale MANets that may scale up to thousands of nodes. Our mechanism is suitable for resource d...
Ahmed Helmy, Saurabh Garg, Priyatham Pamu, Nitin N...
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
CCS
2009
ACM
14 years 2 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
CCS
2004
ACM
14 years 27 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...