Sciweavers

94 search results - page 6 / 19
» Principles of remote attestation
Sort
View
SOCIALCOM
2010
13 years 2 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
CCS
2004
ACM
14 years 26 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ISN
1999
Springer
13 years 11 months ago
The Use of TINA Principles in the Management of Internet Multimedia Conferences
This paper shows how some of the TINA principles used in the development of Service Management techniques for the Broadband ISDN may be applied to the management of Internet Servic...
Quincy Cabell, Peter T. Kirstein, Theodore Pagtzis...
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 20 days ago
Learning Biped Locomotion from First Principles on a Simulated Humanoid Robot Using Linear Genetic Programming
We describe the first instance of an approach for control programming of humanoid robots, based on evolution as the main adaptation mechanism. In an attempt to overcome some of th...
Krister Wolff, Peter Nordin
IWQOS
2001
Springer
13 years 12 months ago
Experimental Extensions to RSVP - Remote Client and One-Pass Signalling
We present and evaluate two experimental extensions to RSVP in terms of protocol specification and implementation. These extensions are targeted at apparent shortcomings of RSVP to...
Martin Karsten