Sciweavers

409 search results - page 28 / 82
» Flexible Scheduler-Independent Security
Sort
View
CUZA
2002
76views more  CUZA 2002»
13 years 8 months ago
Probes Coordination Protocol for Network Performance Measurement
The fast expansion of Grid technologies emphasizes the importance of network performance measurement. Some network measurement methods, like TCP throughput or latency evaluation, a...
Robert Harakaly, Pascale Primet, Franck Bonnassieu...
TDSC
2010
102views more  TDSC 2010»
13 years 7 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
ICICS
2009
Springer
13 years 6 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
WORDS
2003
IEEE
14 years 1 months ago
Security and Middleware
The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the ...
Anders Andersen, Gordon S. Blair, Per Harald Myrva...
ESOP
2010
Springer
14 years 4 hour ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers