Sciweavers

243 search results - page 36 / 49
» LDYIS: a Framework for Model Checking Security Protocols
Sort
View
ESORICS
2006
Springer
14 years 3 days ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
COMCOM
2002
189views more  COMCOM 2002»
13 years 8 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
IPPS
2008
IEEE
14 years 2 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
IROS
2009
IEEE
203views Robotics» more  IROS 2009»
14 years 3 months ago
CoMutaR: A framework for multi-robot coordination and task allocation
— In multi-robot systems, task allocation and coordination are two fundamental problems that share high synergy. Although multi-robot architectures typically separate them into d...
Pedro M. Shiroma, Maria Fernando Montenegro Campos
SIGSOFT
2005
ACM
14 years 9 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde