Sciweavers

1801 search results - page 289 / 361
» Implementation-Oriented Secure Architectures
Sort
View
174
Voted
ACSW
2003
15 years 4 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
116
Voted
CSREASAM
2003
15 years 4 months ago
Implementing Policy-Based Content Filtering for Web Servers
: Web servers dominate our view of the Web today. Security provided by them has been implemented with varying degrees of success. Web servers are frequently successfully attacked, ...
Tony White, Eugen Bacic
AAAI
1994
15 years 4 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
108
Voted
CN
2010
100views more  CN 2010»
15 years 3 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
ENTCS
2008
136views more  ENTCS 2008»
15 years 3 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...