Sciweavers

1407 search results - page 150 / 282
» Systems Theory Model for Information Security
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 8 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
ACISP
1998
Springer
14 years 16 days ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
COMPSAC
2006
IEEE
14 years 2 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
MMM
2006
Springer
128views Multimedia» more  MMM 2006»
14 years 2 months ago
An improved distortion model for rate control of DCT-based video coding
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
Jun Xie, Liang-Tien Chia, Bu-Sung Lee
IEEEARES
2008
IEEE
14 years 2 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...