Sciweavers

2442 search results - page 144 / 489
» Secure Service Orchestration
Sort
View
ECWEB
2000
Springer
110views ECommerce» more  ECWEB 2000»
14 years 21 days ago
Secure PC-Franking for Everyone
PC franking systems allow customers to download postage value into their PCs and to print postage value onto envelopes or mailing labels by using regular desktop printers connected...
Gerrit Bleumer
IEEECIT
2010
IEEE
13 years 6 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
SIGUCCS
2003
ACM
14 years 1 months ago
The SNet model: access, security and e-services for students
This paper will explore the SNet model that Hunter College of the City University of New York developed and implemented. During the Spring of 2002, CUNY as a central organization ...
Anand Padmanabhan
ADHOC
2007
133views more  ADHOC 2007»
13 years 8 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CN
2007
99views more  CN 2007»
13 years 8 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...