Sciweavers

754 search results - page 82 / 151
» Can self-managed systems be trusted
Sort
View
IJMI
2007
134views more  IJMI 2007»
13 years 10 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
SOCIALCOM
2010
13 years 8 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
RAID
2004
Springer
14 years 3 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
SAC
2000
ACM
14 years 2 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
CCIA
2006
Springer
14 years 1 months ago
Improving the Team-work in Heterogeneous Multi-agent Systems: Situation Matching Approach
: This paper presents a method called "Situation Matching" that aids to improve cooperative tasks in heterogeneous multi-agent systems. The situation matching (SM) above ...
Salvador Ibarra, Christian G. Quintero, Díd...