Sciweavers

3638 search results - page 8 / 728
» Distribution chain security
Sort
View
IDTRUST
2010
ACM
13 years 6 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
IEEEARES
2007
IEEE
14 years 1 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 1 months ago
The Move to Artist-Led Online Music Distribution: Explaining Structural Changes in the Digital Music Market
We propose a model for understanding the transformation of the market structure in the recorded music industry value chain due to new forms of digital distribution. It takes into a...
Jesse Bockstedt, Robert J. Kauffman, Frederick J. ...
ICRA
2010
IEEE
162views Robotics» more  ICRA 2010»
13 years 6 months ago
Comparing and modeling distributed control strategies for miniature self-assembling robots
— We propose two contrasting approaches to the scalable distributed control of a swarm of self-assembling miniaturized robots, specifically the formation of chains of a desired ...
William C. Evans, Grégory Mermoud, Alcherio...
HPCC
2005
Springer
14 years 1 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore