Sciweavers

159 search results - page 20 / 32
» Software for everyone by everyone
Sort
View
CCS
2000
ACM
14 years 2 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
COORDINATION
2000
Springer
14 years 1 days ago
Law-Governed Internet Communities
We consider the problem of coordination and control of large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction (LGI) [2, 5]. L...
Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen, Victor...
HICSS
1999
IEEE
111views Biometrics» more  HICSS 1999»
14 years 17 hour ago
T Spaces: The Next Wave
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Tobin J. Lehman, Stephen W. McLaughry, Peter Wycko...
APCHI
1998
IEEE
13 years 12 months ago
A Framework for Event-Driven Demonstration based on the Java Toolkit
An event-driven demonstration is to show the behavior of an application by re-executing the captured events. It is used to provide help regarding how an application works because ...
Motoki Miura, Jiro Tanaka
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash