Sciweavers

2442 search results - page 402 / 489
» Secure Service Orchestration
Sort
View
AC
2004
Springer
13 years 9 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
SAJ
2002
92views more  SAJ 2002»
13 years 9 months ago
An access control architecture for XML documents in workflow environments
The eXtensible Markup Language (XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which informati...
Reinhardt A. Botha, Jan H. P. Eloff
TC
1998
13 years 9 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
ICRA
2010
IEEE
195views Robotics» more  ICRA 2010»
13 years 8 months ago
Cooperative tracking of moving objects and face detection with a dual camera sensor
— This paper describes a sensor for autonomous surveillance capable of continuously monitoring the environment, while acquiring detailed images of specific areas. This is achiev...
Stefano Ghidoni, Alberto Pretto, Emanuele Menegatt...
JPDC
2011
131views more  JPDC 2011»
13 years 4 months ago
Conditional e-payments with transferability
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are ...
Bogdan Carbunar, Weidong Shi, Radu Sion