Sciweavers

256 search results - page 31 / 52
» CARDS: A Distributed System for Detecting Coordinated Attack...
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
CN
2004
108views more  CN 2004»
13 years 6 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
ICCS
2007
Springer
14 years 28 days ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
HPCC
2007
Springer
14 years 28 days ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
PROMAS
2005
Springer
14 years 7 days ago
A Model-Based Executive for Commanding Robot Teams
The paper presents a way to robustly command a system of systems as a single entity. Instead of modeling each component system in isolation and then manually crafting interaction p...
Anthony Barrett