Sciweavers

2270 search results - page 88 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 9 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
CAISE
2006
Springer
14 years 16 days ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
ITNG
2007
IEEE
14 years 3 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
PERCOM
2008
ACM
14 years 8 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
ISORC
2008
IEEE
14 years 3 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu