Sciweavers

762 search results - page 20 / 153
» Security Contexts in Autonomic Systems
Sort
View
DBSEC
2007
106views Database» more  DBSEC 2007»
13 years 11 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
ACSAC
2004
IEEE
14 years 1 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
AVI
2000
13 years 11 months ago
VISPS, a Visual System for Plan Specification
In various circumstances, it is possible to arrive at the need to specify sequences of operations that a "machine" has to perform to achieve a purpose. This paper will p...
Marco Porta
HAIS
2008
Springer
13 years 10 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
IAT
2005
IEEE
14 years 3 months ago
Automatic Generation of Self-controlled Autonomous Agents
Being able to trust in a system behavior is of prime importance, particularly within the context of critical applications as embedded or real-time systems. We want to ensure that ...
Caroline Chopinaud, Amal El Fallah-Seghrouchni, Pa...