Sciweavers

2024 search results - page 42 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
IJNSEC
2008
152views more  IJNSEC 2008»
15 years 4 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
165
Voted
PERCOM
2007
ACM
16 years 4 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
RBAC
1998
84views more  RBAC 1998»
15 years 5 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
JVM
2004
118views Education» more  JVM 2004»
15 years 5 months ago
Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing
The increased popularity of grid systems and cycle sharing across organizations leads to the need for scalable systems that provide facilities to locate resources, to be fair in t...
Ali Raza Butt, Xing Fang, Y. Charlie Hu, Samuel P....
OSDI
1996
ACM
15 years 5 months ago
Microkernels Meet Recursive Virtual Machines
This paper describes a novel approach to providingmodular and extensible operating system functionality and encapsulated environments based on a synthesis of microkernel and virtu...
Bryan Ford, Mike Hibler, Jay Lepreau, Patrick Tull...