Sciweavers

2979 search results - page 521 / 596
» Modelling secure multiagent systems
Sort
View
131
Voted
GI
2003
Springer
15 years 7 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
15 years 6 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
160
Voted
ACSW
2003
15 years 4 months ago
Digital Rights Management for Content Distribution
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...
97
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 2 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
139
Voted
ACMICEC
2006
ACM
213views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
CMieux: adaptive strategies for competitive supply chain trading
Supply chains are a central element of today’s global economy. Existing management practices consist primarily of static interactions between established partners. Global compet...
Michael Benisch, Alberto Sardinha, James Andrews, ...