Sciweavers

199 search results - page 20 / 40
» Developing a security protocol for a distributed decision su...
Sort
View
ICNP
1999
IEEE
13 years 12 months ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
WETICE
1997
IEEE
13 years 11 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
JIPS
2007
223views more  JIPS 2007»
13 years 7 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
WWW
2009
ACM
14 years 8 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
IJISEC
2007
119views more  IJISEC 2007»
13 years 7 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny