Sciweavers

464 search results - page 30 / 93
» Identity Management
Sort
View
WETICE
2005
IEEE
14 years 1 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
EUROSSC
2006
Springer
13 years 11 months ago
Dynamic Bayesian Networks for Visual Surveillance with Distributed Cameras
Abstract. This paper presents a surveillance system for tracking multiple people through a wide area with sparsely distributed cameras. The computational core of the system is an a...
Wojciech Zajdel, Ali Taylan Cemgil, Ben J. A. Kr&o...
SIGCOMM
2009
ACM
14 years 2 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
IJAHUC
2010
111views more  IJAHUC 2010»
13 years 5 months ago
A network-based global mobility management architecture
: This paper specifies a network-based global mobility management architecture, named NetGMM. NetGMM supports network-based mobility management and non-Mobile IP mobile environment...
Huachun Zhou, Hongbin Luo, Hongke Zhang, Chi-Hsian...
EUROPKI
2004
Springer
14 years 1 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...