Sciweavers

1801 search results - page 325 / 361
» Implementation-Oriented Secure Architectures
Sort
View
EDOC
2002
IEEE
14 years 3 months ago
Discretionary Enforcement of Electronic Contracts
As in traditional commerce, parties to a contract in ebusiness environments are expected to operate in good faith and comply with mutually agreed terms of contract. It may be the ...
Zoran Milosevic, Audun Jøsang, Theodosis Di...
INFOCOM
2002
IEEE
14 years 3 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
WETICE
2002
IEEE
14 years 3 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
HAIS
2010
Springer
14 years 3 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
INFOCOM
2000
IEEE
14 years 2 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....