Sciweavers

6137 search results - page 17 / 1228
» Securing Collaborative Applications
Sort
View
NSPW
2006
ACM
14 years 1 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
AINA
2011
IEEE
12 years 11 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
ICCS
2001
Springer
13 years 12 months ago
Capacity and Capability Computing Using Legion
Computational Scientists often cannot easily access the large amounts of resources their applications require. Legion is a collection of software services that facilitate the secur...
Anand Natrajan, Marty Humphrey, Andrew S. Grimshaw
AAAI
2004
13 years 9 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
IPPS
2007
IEEE
14 years 1 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speci...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...