Sciweavers

1120 search results - page 124 / 224
» Trust in Electronic Environments
Sort
View
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 3 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
IEEESCC
2005
IEEE
14 years 3 months ago
Architectural Support for Automatic Service Composition
We consider architectural properties required for supporting automatic service composition. After defining composable service architecture, we proceed to examine the role of trus...
Nikola Milanovic, Miroslaw Malek
ECSA
2008
Springer
14 years 2 days ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
WSC
2000
13 years 11 months ago
Simulation optimization using tabu search
Investigation of the performance and operation of complex systems in manufacturing or other environments, analytical models of these systems become very complicated. Because of th...
Berna Dengiz, Cigdem Alabas
ENTCS
2007
128views more  ENTCS 2007»
13 years 10 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira