Sciweavers

811 search results - page 148 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
RULEML
2005
Springer
14 years 2 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh
MA
1997
Springer
149views Communications» more  MA 1997»
14 years 24 days ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 3 months ago
Responsiveness on the Interactive Grid
The Grid vision promises the secure and dynamic sharing of heterogeneous resources across the Internet. To date the emphasis has been on supercomputing scenarios where a relatively...
Colin Allison, Stuart D. J. Purdie, Alan Miller
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson