Sciweavers

2057 search results - page 378 / 412
» Distributed Secure Systems: Then and Now
Sort
View
HOTOS
2009
IEEE
14 years 15 days ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
CMSB
2006
Springer
14 years 11 days ago
Probabilistic Model Checking of Complex Biological Pathways
Abstract. Probabilistic model checking is a formal verification technique that has been successfully applied to the analysis of systems from a broad range of domains, including sec...
John Heath, Marta Z. Kwiatkowska, Gethin Norman, D...
ICWS
2003
IEEE
13 years 10 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
ECIS
2000
13 years 10 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...
TWC
2008
176views more  TWC 2008»
13 years 8 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...