-
2
-
-
0345046487
-
Human authentication, the Achilles heel of secure systems
-
O'Gorman L: 'Human authentication, the Achilles heel of secure systems', (2002) http://www.research.avayalabs.com/user/logorman/UA_Stevens.ppt
-
(2002)
-
-
O'Gorman, L.1
-
3
-
-
0009901943
-
Security focused
-
Online report on information system security
-
Briney A: 'Security focused', Online report on information system security (2000) - http://www.infosecuritymag.com
-
(2000)
-
-
Briney, A.1
-
4
-
-
0344184104
-
PKI security for JXTA overlay networks
-
Altman J: 'PKI security for JXTA overlay networks', (2003) - http://www.jxta.org/docs/pki-security-for-jxta.pdf
-
(2003)
-
-
Altman, J.1
-
5
-
-
84947229405
-
Mapping the Gnutella network
-
(March)
-
Ripeanu M and Foster I: 'Mapping the Gnutella network', 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), Cambridge, Massachusetts, in: 'Lecture Notes in Computer Science 2429', Springer, pp 85-93 (March 2002).
-
(2002)
1st International Workshop on Peer-to-Peer Systems (IPTPS'02), Cambridge, Massachusetts, in: 'Lecture Notes in Computer Science 2429', Springer
, pp. 85-93
-
-
Ripeanu, M.1
Foster, I.2
-
6
-
-
26544441130
-
An open innovative collaboration
-
Project JXTA
-
Project JXTA: 'An Open Innovative Collaboration' - http://www.jxta.org/project/www/docs/OpenInnovative.pdf
-
-
-
-
7
-
-
0010344835
-
Poblano: A distributed trust model for peer-to-peer networks
-
Chen R and Yeager W: 'Poblano: a distributed trust model for peer-to-peer networks', (2003) - http://www.jxta.org/docs/trust.pdf
-
(2003)
-
-
Chen, R.1
Yeager, W.2
-
11
-
-
0043139094
-
Agents that buy and sell: Transforming commerce as we know it
-
(March)
-
Maes P, Guttman R and Moukas A: 'Agents that buy and sell: transforming commerce as we know it', Communications of the ACM (March 1999) - http://www.media.mit.edu/
-
(1999)
Communications of the ACM
-
-
Maes, P.1
Guttman, R.2
Moukas, A.3
-
14
-
-
85015336184
-
Intelligent agents for intrusion detection
-
Syracuse, NY (September)
-
Helmer G G, Wong J S, Honavar V and Miller L: 'Intelligent agents for intrusion detection', IEEE Information Technology Conference, pp 121-124, Syracuse, NY (September 1998).
-
(1998)
IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.G.1
Wong, J.S.2
Honavar, V.3
Miller, L.4
-
15
-
-
0345477916
-
-
JADE
-
JADE - http://jade.cselt.it/
-
-
-
-
16
-
-
0032121071
-
The ZEUS agent building tool-kit
-
(July)
-
Collis J C et al.: 'The ZEUS agent building tool-kit', BT Technol J, 16, No 3, pp 60-68 (July 1998).
-
(1998)
BT Technol J
, vol.16
, Issue.3
, pp. 60-68
-
-
Collis, J.C.1
-
17
-
-
0344184103
-
-
IBM Able Bean
-
IBM Able Bean - http://www.alphaworks.ibm.com/tech/able/
-
-
-
-
18
-
-
33751099026
-
Distributed systems topologies
-
Minar N: 'Distributed systems topologies', (2001) - http://www.openp2p.com/pub/a/p2p/2001/12/14/topologies_one.html
-
(2001)
-
-
Minar, N.1
-
19
-
-
0003700417
-
Kerberos authentication and authorisation system
-
MIT Project Athena, Cambridge, Massachusetts (December)
-
Miller S P, Neuman B C, Schiller J I and Saltzer J H: 'Kerberos authentication and authorisation system', MIT Project Athena, Cambridge, Massachusetts (December 1987).
-
(1987)
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
20
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
Department of Computer Sciences, Purdue University, Coast TR 98-05
-
Balasubramaniyan J, Garcia-Fernandez J O, Spafford E and Zamboni D: 'An architecture for intrusion detection using autonomous agents', Department of Computer Sciences, Purdue University, Coast TR 98-05 (1998).
-
(1998)
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.O.2
Spafford, E.3
Zamboni, D.4
-
21
-
-
0345477912
-
A methodology for using intelligent agents to provide automated intrusion response
-
(June)
-
Carver C A, Hill J M, Surdu J R and Pooch U W: 'A methodology for using intelligent agents to provide automated intrusion response', IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, pp 110-116 (June 2000).
-
(2000)
IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY
, pp. 110-116
-
-
Carver, C.A.1
Hill, J.M.2
Surdu, J.R.3
Pooch, U.W.4
-
23
-
-
0002320533
-
Immunity by design: An artificial immune system
-
Hofmeyr S and Forrest S: 'Immunity by design: an artificial immune system', Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA, pp 1289-1296 (1999).
-
(1999)
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forrest, S.2
-
24
-
-
0000393542
-
A logic-based knowledge representation for authorization with delegation
-
(extended abstract); (Full version is IBM Research Report RC 21492)
-
Li N, Feigenbaum J and Grosof B N: 'A logic-based knowledge representation for authorization with delegation', (extended abstract) 12th Intl IEEE Computer Security Foundations Workshop (1999) (Full version is IBM Research Report RC 21492).
-
(1999)
12th Intl IEEE Computer Security Foundations Workshop
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.N.3
-
25
-
-
0345477914
-
-
Cougaar
-
Cougaar - http://www.cougaar.org/
-
-
-
-
26
-
-
0344615673
-
-
Tryllian
-
Tryllian - http://www.tryllian.com/
-
-
-
-
27
-
-
0344184102
-
-
Web Services
-
Web Services - http://www.oasis-open.org/committees/security/
-
-
-
|