Sciweavers

178 search results - page 13 / 36
» Threat analysis and security architecture of mobile agent ba...
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 2 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
AOSE
2001
Springer
14 years 15 days ago
Towards an ADL for Designing Agent-Based Systems
In this paper, we describe the Architecture Description Language (ADL) that we are defining for the design of agentbased systems. This aims at filing the gap between the analysis ...
Marie-Pierre Gervais, Florin Muscutariu
ISN
2000
Springer
120views Communications» more  ISN 2000»
13 years 11 months ago
Providing Customisable Network Management Services Through Mobile Agents
Telecommunications network management has attracted a lot of attention in terms of research and standardisation in the last decade. TMN and TINA architectural frameworks try to add...
David Griffin, George Pavlou, Panos Georgatsos
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski