Sciweavers

7741 search results - page 60 / 1549
» Security in Active Networks
Sort
View
ICPPW
2006
IEEE
14 years 4 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ACSAC
2005
IEEE
14 years 3 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
FUIN
2007
84views more  FUIN 2007»
13 years 10 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska
DANCE
2002
IEEE
14 years 3 months ago
An Active Networking Approach to Service Customization
Active networking is a powerful technology to insert new functionality into the networking. In this paper we look at how active networking technology can be used to customize netw...
Peter Steenkiste, Prashant R. Chandra, Jun Gao, Sy...
GLOBECOM
2007
IEEE
14 years 4 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim