Sciweavers

2178 search results - page 84 / 436
» Toward Systemically Secure IT Architectures
Sort
View
WOA
2003
13 years 10 months ago
Towards the Improvement of Monitoring and Control Agencies through Knowledge-Based Approaches
Abstract—This paper illustrates how the functionalities of monitoring/control systems, within an agent–based framework, can be improved by the adoption of Knowledge–Based tec...
Matteo Palmonari, Fabio Sartori
JNW
2007
113views more  JNW 2007»
13 years 9 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
IPPS
2005
IEEE
14 years 2 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
AIL
2005
90views more  AIL 2005»
13 years 9 months ago
Towards a multi-agent system for regulated information exchange in crime investigations
This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about info...
Pieter Dijkstra, Floris Bex, Henry Prakken, Kees d...
ESORICS
2010
Springer
13 years 10 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan