Sciweavers

141 search results - page 16 / 29
» Composition and integrity preservation of secure reactive sy...
Sort
View
AGENTS
1998
Springer
13 years 12 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
POPL
2008
ACM
14 years 8 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
EDOC
2003
IEEE
14 years 27 days ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ITNG
2008
IEEE
14 years 2 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...