A distributed software system's deployment architecture can have a significant impact on the system's dependability. Dependability is a function of various system paramet...
Sam Malek, Nels Beckman, Marija Mikic-Rakic, Nenad...
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Abstract— Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and ...
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...