Sciweavers

3605 search results - page 47 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
CSREAESA
2008
13 years 9 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
13 years 12 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
TDSC
2011
13 years 2 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 5 hour ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ICAS
2008
IEEE
190views Robotics» more  ICAS 2008»
14 years 2 months ago
A Survey of Context Adaptation in Autonomic Computing
—Autonomic Computing (AC) is an emerging paradigm aiming at simplifying the administration of complex computer systems. Efforts required to deploy and maintain complex systems ar...
Cornel Klein, Reiner N. Schmid, Christian Leuxner,...