Sciweavers

2517 search results - page 50 / 504
» Secure Deployment of Components
Sort
View
CCS
2000
ACM
15 years 6 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
IWSOS
2009
Springer
15 years 9 months ago
Laying Pheromone Trails for Balanced and Dependable Component Mappings
This paper presents an optimization framework for finding efficient deployment mappings of replicated service components (to nodes), while accounting for multiple services simult...
Máté J. Csorba, Hein Meling, Poul E....
ICISS
2007
Springer
15 years 8 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
125
Voted
PDCAT
2007
Springer
15 years 8 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
112
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...