Sciweavers

318 search results - page 47 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
ICSE
2001
IEEE-ACM
14 years 14 hour ago
Engineering Mobile-Agent Applications via Context-Dependent Coordination
: The design and development of Internet applications, requiring dynamic and possibly mobile access to Internet resources, can take advantage of an approach based on autonomous mob...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
MOBISYS
2008
ACM
14 years 7 months ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong
TPDS
2010
113views more  TPDS 2010»
13 years 2 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
COLCOM
2008
IEEE
13 years 9 months ago
RiBAC: Role Interaction Based Access Control Model for Community Computing
Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among ...
Youna Jung, Amirreza Masoumzadeh, James B. D. Josh...