Sciweavers

4897 search results - page 86 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 10 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
CCGRID
2001
IEEE
14 years 26 days ago
Performance Evaluation of an Agent-Based Resource Management Infrastructure for Grid Computing
Resource management is an important infrastructure in the grid computing environment. Scalability and adaptability are two key challenges in the implementation of such complex sof...
Junwei Cao, Darren J. Kerbyson, Graham R. Nudd
IEEEARES
2006
IEEE
14 years 3 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ACSAC
2006
IEEE
14 years 3 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
ICDAR
2007
IEEE
14 years 3 months ago
Energy-Based Models in Document Recognition and Computer Vision
The Machine Learning and Pattern Recognition communities are facing two challenges: solving the normalization problem, and solving the deep learning problem. The normalization pro...
Yann LeCun, Sumit Chopra, Marc'Aurelio Ranzato, Fu...