Sciweavers

330 search results - page 48 / 66
» SKMA: a key management architecture for SCADA systems
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
POLICY
2007
Springer
14 years 1 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov
WETICE
2002
IEEE
14 years 18 days ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
SIGMOD
2004
ACM
157views Database» more  SIGMOD 2004»
14 years 7 months ago
Holistic UDAFs at streaming speeds
Many algorithms have been proposed to approximate holistic aggregates, such as quantiles and heavy hitters, over data streams. However, little work has been done to explore what t...
Graham Cormode, Theodore Johnson, Flip Korn, S. Mu...
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
14 years 1 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam