Sciweavers

537 search results - page 41 / 108
» The Saga Security System: A Security Architecture for Open D...
Sort
View
ICCS
2001
Springer
14 years 1 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
AP2PC
2007
Springer
13 years 10 months ago
Design of a Secure and Decentralized Location Service for Agent Platforms
Abstract. Agent platforms designed for Internet-scale, open networks need scalable and secure location services for agents and services. The location service based on the Fonkey pu...
Benno J. Overeinder, Michel Oey, Reinier Timmer, R...
ITEE
2007
13 years 10 months ago
Distributed Power Generation: Requirements and Recommendations for an ICT Architecture
: Contemporary power distribution faces various new challenges. Most of those challenges have a strong impact on the ICT-structure required and on system architecture. This contrib...
Ludger Winkels, Jan-Patrick Osterloh, Fabian Gr&uu...
JCDL
2003
ACM
103views Education» more  JCDL 2003»
14 years 2 months ago
SCENS: A System for the Mediated Sharing of Sensitive Data
1 This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS...
Song Ye, Fillia Makedon, Tilmann Steinberg, Li She...
CL
2002
Springer
13 years 8 months ago
Behavioural typing for safe ambients
We introduce a typed variant of Safe Ambients, named Secure Safe Ambients (SSA), whose type system allows behavioral invariants of ambients to be expressed and verified. The most ...
Michele Bugliesi, Giuseppe Castagna