Sciweavers

178 search results - page 23 / 36
» Threat analysis and security architecture of mobile agent ba...
Sort
View
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ISEM
2006
167views more  ISEM 2006»
13 years 8 months ago
Agent-based workflow management systems (WfMSs)
Workflow management systems (WfMS) based on agent technology can cope with the rapidly evolving business environment better than most other systems as they are more flexible and op...
Lars Ehrler, Martin K. Fleurke, Maryam Purvis, Bas...
JPDC
2006
175views more  JPDC 2006»
13 years 8 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 29 days ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
HCW
2000
IEEE
14 years 12 days ago
Evaluation of PAMS' Adaptive Management Services
Management of large-scale parallel and distributed applications is an extremely complex task due to factors such as centralized management architectures, lack of coordination and ...
Yoonhee Kim, Salim Hariri, Muhamad Djunaedi