Sciweavers

1352 search results - page 75 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AGENTS
1998
Springer
14 years 1 months ago
A Synergy of Agent Components: Social Comparison for Failure Detection
of other components. This abstract presents an implemented illustration of such explicit component synergy and its usefulness in dynamic multi-agent environments. In such environme...
Gal A. Kaminka, Milind Tambe
ICICS
2005
Springer
14 years 2 months ago
Batching SSL/TLS Handshake Improved
Secure socket layer (SSL) is the most popular protocol to secure Internet communications. Since SSL handshake requires a large amount of computational resource, batch RSA was propo...
Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
CASCON
2008
106views Education» more  CASCON 2008»
13 years 10 months ago
Using economic models to allocate resources in database management systems
Resource allocation in database management systems is a performance management process in which an autonomic DBMS makes resource allocation decisions based on properties like work...
Mingyi Zhang, Patrick Martin, Wendy Powley, Paul B...
GLOBECOM
2008
IEEE
14 years 3 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
IEEEARES
2007
IEEE
14 years 3 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...