Sciweavers

2517 search results - page 6 / 504
» Secure Deployment of Components
Sort
View
SAC
2010
ACM
14 years 2 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
CCS
2007
ACM
14 years 1 months ago
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Pe...
SC
2009
ACM
14 years 7 days ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 9 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
KBSE
2009
IEEE
14 years 2 months ago
Let the Ants Deploy Your Software - An ACO Based Deployment Optimisation Strategy
Abstract—Decisions regarding the mapping of software components to hardware nodes affect the quality of the resulting system. Making these decisions is hard when considering the ...
Aldeida Aleti, Lars Grunske, Indika Meedeniya, Ire...