Sciweavers

762 search results - page 100 / 153
» Security Contexts in Autonomic Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
ISCAPDCS
2004
13 years 11 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
14 years 3 months ago
Specifying Web Service Recovery Support with Conversations
Web services offer a number of valuable features towards supporting the development of open distributed systems, built out of the composition of autonomous services. Nonetheless, ...
Ferda Tartanoglu, Valérie Issarny
ATAL
2005
Springer
14 years 3 months ago
Development of Self-organising Emergent Applications with Simulation-Based Numerical Analysis
The goal of engineering self-organising emergent systems is to acquire a macroscopic system behaviour solely from autonomous local activity and interaction. Due to the non-determin...
Tom De Wolf, Tom Holvoet, Giovanni Samaey
ICARIS
2004
Springer
14 years 3 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...