Sciweavers

77 search results - page 11 / 16
» Ontologies to Support Call Control Policies
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SEC
2007
13 years 9 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
COORDINATION
2000
Springer
13 years 11 months ago
Law-Governed Internet Communities
We consider the problem of coordination and control of large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction (LGI) [2, 5]. L...
Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen, Victor...
ACSAC
1997
IEEE
13 years 11 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
NGC
2006
Springer
140views Communications» more  NGC 2006»
13 years 7 months ago
Re-representation and Creative Analogy: A Lexico-semantic Perspective
Analogy is a powerful boundary-transcending process that exploits a conceptual system's ability to perform controlled generalization in one domain and re-specialization into ...
Tony Veale