Sciweavers

1352 search results - page 100 / 271
» Designing Security Requirements Models Through Planning
Sort
View
WMASH
2003
ACM
14 years 3 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
SP
1989
IEEE
14 years 2 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
ICSE
1998
IEEE-ACM
14 years 2 months ago
Consistency Management for Complex Applications
Consistency management is an important requirement in many complex applications, but current programming languages and database systems provide inadequate support for it. To addre...
Peri L. Tarr, Lori A. Clarke
WISEC
2009
ACM
14 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
ATAL
2009
Springer
14 years 4 months ago
Emergent service provisioning and demand estimation through self-organizing agent communities
A major challenge within open markets is the ability to satisfy service demand with an adequate supply of service providers, especially when such demand may be volatile due to cha...
Mariusz Jacyno, Seth Bullock, Michael Luck, Terry ...