Sciweavers

6137 search results - page 157 / 1228
» Securing Collaborative Applications
Sort
View
SAC
2009
ACM
14 years 1 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
IEEEARES
2010
IEEE
14 years 4 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif
PCI
2009
Springer
14 years 1 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
GROUP
1999
ACM
14 years 1 months ago
Modeling collaboration using shared objects
Many object-oriented toolkits and frameworks for groupware development provide shared objects as a basic service. This relieves developers of a lot of problems originating from th...
Christian Schuckmann, Jan Schümmer, Peter Sei...
CN
1998
118views more  CN 1998»
13 years 8 months ago
Predicting Network Traffic for Collaborative Virtual Environments
We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical...
Chris Greenhalgh, Steve Benford, Adrian Bullock, N...