Sciweavers

2207 search results - page 141 / 442
» Security at the Internet Layer
Sort
View
ACSW
2003
15 years 6 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
136
Voted
IAAI
2003
15 years 6 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
CN
2008
111views more  CN 2008»
15 years 4 months ago
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
Overload control mechanisms such as admission control and connection differentiation have proven effective for preventing overload of application servers running secure web applic...
Jordi Guitart, David Carrera, Vicenç Beltra...
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
116
Voted
ICN
2009
Springer
15 years 11 months ago
An Automotive Security System for Anti-theft
— Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system t...
Huaqun Guo, H. S. Cheng, Yong Dong Wu, J. J. Ang, ...