Sciweavers

2270 search results - page 133 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
EJWCN
2010
115views more  EJWCN 2010»
13 years 3 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...
CCS
2006
ACM
14 years 20 days ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
EMSOFT
2004
Springer
14 years 2 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
HICSS
2003
IEEE
94views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Theory and Measurement of Meeting Satisfaction
For many years, meeting satisfaction has been a key outcome variable in experimental Group Support Systems (GSS) research. GSS research results on meeting satisfaction are conflic...
Robert O. Briggs, Gert-Jan de Vreede, Bruce A. Rei...