Sciweavers

4118 search results - page 48 / 824
» Mechanisms for usage control
Sort
View
TRUSTBUS
2005
Springer
14 years 4 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
14 years 3 months ago
A mechanism design approach to the stabilization of networked dynamical systems
— In this paper we study the problem of stabilizing a networked control system (NCS) composed of N linear dynamical subplants and an equal number of controllers acting over a sha...
Luca Galbusera, Nicola Gatti, Carlo Romani
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 5 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICSE
2009
IEEE-ACM
13 years 8 months ago
Architecture-driven self-adaptation and self-management in robotics systems
We describe an architecture-centric design and implementation approach for building self-adapting and selfmanaging robotics systems. The basis of our approach is the concept of me...
George Edwards, Joshua Garcia, Hossein Tajalli, Da...
NDSS
2009
IEEE
14 years 5 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson