Sciweavers

339 search results - page 54 / 68
» The Evolution of RFID Security
Sort
View
POLICY
2005
Springer
14 years 2 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
WAC
2005
Springer
122views Communications» more  WAC 2005»
14 years 2 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
ICSM
2003
IEEE
14 years 1 months ago
Critical Success Factors in Software Maintenance-A Case Study
: The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance pr...
Harry M. Sneed, Peter Brössler
WETICE
2003
IEEE
14 years 1 months ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
CSE
2009
IEEE
13 years 12 months ago
Socially Enhanced Network Address Translation
—The rapid evolution of the Internet has forced the use of Network Address Translation (NAT) to help slow the decline of publicly available IPv4 address space. While NAT provides...
Alexis Malozemoff, Muthucumaru Maheswaran