Sciweavers

249 search results - page 4 / 50
» Modelling a Secure, Mobile, and Transactional System with CO...
Sort
View
FUIN
2008
74views more  FUIN 2008»
13 years 7 months ago
Security in a Model for Long-running Transactions
Abstract. Communicating Hierarchical Transaction-based Timed Automata have been introduced to model systems performing long
Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo ...
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 1 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 9 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
DEXA
1999
Springer
158views Database» more  DEXA 1999»
13 years 12 months ago
Transaction Shipping Approach for Mobile Distributed Real-Time Databases
Due to the unpredictability of mobile network, it is difficult to meet transaction deadlines in a mobile distributed real-time database system (MDRDTBS). We propose the idea of tra...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
ISCAPDCS
2004
13 years 9 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...