Sciweavers

2403 search results - page 290 / 481
» Cyberinsurance in IT Security Management
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
13 years 9 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
DIM
2007
ACM
14 years 1 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
SEC
2008
13 years 11 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
IOR
2008
148views more  IOR 2008»
13 years 9 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...