Sciweavers

2517 search results - page 450 / 504
» Secure Deployment of Components
Sort
View
MKWI
2008
160views Business» more  MKWI 2008»
13 years 10 months ago
Architectural Design of Flexible Process Management Technology
: To provide effective support, process-aware information systems (PAIS) must not freeze existing business processes. Instead they should enable authorized users to deviate on-the-...
Manfred Reichert, Peter Dadam, Martin Jurisch, Ulr...
AUSFORENSICS
2004
13 years 10 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
CCN
2006
278views Communications» more  CCN 2006»
13 years 10 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
ISCAPDCS
2004
13 years 10 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
WICSA
2001
13 years 10 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan