-
1
-
-
38149077110
-
-
IP Security Working Group
-
IP Security Working Group, http://www.ietf.org/html.charters/ipsp- charter.html/
-
-
-
-
2
-
-
38149048378
-
-
IST E2R II Project
-
IST E2R II Project, http://e2r.motlabs.com/
-
-
-
-
4
-
-
38149123954
-
-
Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOL-FASI). In: FCS 2004. Conjunction with Workshop on Foundations on Computer Security (2004)
-
Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOL-FASI). In: FCS 2004. Conjunction with Workshop on Foundations on Computer Security (2004)
-
-
-
-
5
-
-
0036014438
-
A Lightweight Reconfigurable Security Mechanism for 3G/4G Mobile Devices
-
Al-Muhtadi, J., Mickunas, D., Campbell, R.: A Lightweight Reconfigurable Security Mechanism for 3G/4G Mobile Devices. IEEE Wireless Communications 9(2), 60-65 (2002)
-
(2002)
IEEE Wireless Communications
, vol.9
, Issue.2
, pp. 60-65
-
-
Al-Muhtadi, J.1
Mickunas, D.2
Campbell, R.3
-
6
-
-
33847011964
-
-
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: PerCom 2003. International Conference on Pervasive Computing and Communications (2003)
-
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: PerCom 2003. International Conference on Pervasive Computing and Communications (2003)
-
-
-
-
7
-
-
38149073961
-
-
Almenárez, F., Marín, A., Campo, C., García, C.: PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In: PSPT. Mobiquitous Workshop on Pervasive Security, Privacy and Trust (2004)
-
Almenárez, F., Marín, A., Campo, C., García, C.: PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In: PSPT. Mobiquitous Workshop on Pervasive Security, Privacy and Trust (2004)
-
-
-
-
8
-
-
24644518659
-
-
Almenárez, F., Marín, A., Campo, C., García, C.: TrustAC: Trust-Based Access Control for Pervasive Devices. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, 3450, Springer, Heidelberg (2005)
-
Almenárez, F., Marín, A., Campo, C., García, C.: TrustAC: Trust-Based Access Control for Pervasive Devices. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, Springer, Heidelberg (2005)
-
-
-
-
10
-
-
33751023510
-
-
Bruneton, E., Coupaye, T., Leclerc, M., Quema, V., Stefani, J.B.: An Open Component Model and its Support in Java. In: Crnković, I., Stafford, J.A., Schmidt, H.W., Wallnau, K. (eds.) CBSE 2004. LNCS, 3054, Springer, Heidelberg (2004)
-
Bruneton, E., Coupaye, T., Leclerc, M., Quema, V., Stefani, J.B.: An Open Component Model and its Support in Java. In: Crnković, I., Stafford, J.A., Schmidt, H.W., Wallnau, K. (eds.) CBSE 2004. LNCS, vol. 3054, Springer, Heidelberg (2004)
-
-
-
-
11
-
-
0037232265
-
Security in an Autonomic Computing Environment
-
Chess, D., Palmer, C., White, S.: Security in an Autonomic Computing Environment. IBM Systems Journal 42(1), 107-118 (2003)
-
(2003)
IBM Systems Journal
, vol.42
, Issue.1
, pp. 107-118
-
-
Chess, D.1
Palmer, C.2
White, S.3
-
12
-
-
84957975130
-
-
Wiley, Chichester
-
Cook, D., Das, S.: Smart Environments: Technologies, Protocols, and Applications. Wiley, Chichester (2005)
-
(2005)
Smart Environments: Technologies, Protocols, and Applications
-
-
Cook, D.1
Das, S.2
-
13
-
-
84948995473
-
A Context-Aware Security Architecture for Emerging Applications
-
Covington, M., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: ACSAC. Annual Computer Security Applications Conference (2002)
-
(2002)
ACSAC. Annual Computer Security Applications Conference
-
-
Covington, M.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
14
-
-
0035791053
-
Securing Context-Aware Applications using Environment Roles
-
Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing Context-Aware Applications using Environment Roles. In: SACMAT 2001. Symposium on Access Control Models and Technologies (2001)
-
(2001)
SACMAT 2001. Symposium on Access Control Models and Technologies
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
16
-
-
38149092433
-
-
David, P.C., Ledoux, T.: WildCAT: A Generic Framework for Context-Aware Applications. In: International Workshop on Middleware for Pervasive and Ad-Hoc Computing (2005)
-
David, P.C., Ledoux, T.: WildCAT: A Generic Framework for Context-Aware Applications. In: International Workshop on Middleware for Pervasive and Ad-Hoc Computing (2005)
-
-
-
-
17
-
-
38149132330
-
-
E2R Deliverable D2.2. Equipment Management Framework for Reconfiguration: Architecture, Interfaces, and Functions (December 2005)
-
E2R Deliverable D2.2. Equipment Management Framework for Reconfiguration: Architecture, Interfaces, and Functions (December 2005)
-
-
-
-
18
-
-
85084161456
-
-
Fassino, J.P., Stefani, J.B., Lawall, J., Muller, G.: Think: A Software Framework for Component-Based Operating System Kernels. In: USENIX Annual Technical Conference (2002)
-
Fassino, J.P., Stefani, J.B., Lawall, J., Muller, G.: Think: A Software Framework for Component-Based Operating System Kernels. In: USENIX Annual Technical Conference (2002)
-
-
-
-
19
-
-
0037236308
-
The Dawning of the Autonomic Computing Era
-
Ganek, A., Corbi, T.: The Dawning of the Autonomic Computing Era. IBM Systems Journal 42(1), 5-18 (2003)
-
(2003)
IBM Systems Journal
, vol.42
, Issue.1
, pp. 5-18
-
-
Ganek, A.1
Corbi, T.2
-
20
-
-
2542610696
-
Terminal-Centric View of Software Reconfigurable System Architecture and Enabling Components and Technologies
-
Georganopoulos, N., Farnham, T., Burgess, R., Schöler, T., Sessler, J., Warr, P., Golubicic, Z., Platbrood, F-, Souville, B., Buljore, S.: Terminal-Centric View of Software Reconfigurable System Architecture and Enabling Components and Technologies. IEEE Communications Magazine 42(5), 100-110 (2004)
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 100-110
-
-
Georganopoulos, N.1
Farnham, T.2
Burgess, R.3
Schöler, T.4
Sessler, J.5
Warr, P.6
Golubicic, Z.7
Platbrood, F.8
Souville, B.9
Buljore, S.10
-
23
-
-
62749155242
-
Security Ontology for Annotating Resources
-
Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. In: ODBASE 2005. International Conference on Ontologies, Databases, and Application of Semantics (2005)
-
(2005)
ODBASE 2005. International Conference on Ontologies, Databases, and Application of Semantics
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
24
-
-
33845427583
-
An Architecture for Autonomic Security Adaptation
-
Klenk, A., Niedermayer, H., Masekowsky, M., Carle, G.: An Architecture for Autonomic Security Adaptation. Annals of Telecommunications 61(9-10) (2006)
-
(2006)
Annals of Telecommunications
, vol.61
, Issue.9-10
-
-
Klenk, A.1
Niedermayer, H.2
Masekowsky, M.3
Carle, G.4
-
25
-
-
33646851522
-
How to Exploit Ontologies in Trust Negotiation
-
Leithead, T., Nejdi, W., Oldmedilla, D., Seamons, K., Winslett, M., Yu, T., Zhang, C: How to Exploit Ontologies in Trust Negotiation. In: Workshop on Trust, Security, and Reputation on the Semantic Web (2004)
-
(2004)
Workshop on Trust, Security, and Reputation on the Semantic Web
-
-
Leithead, T.1
Nejdi, W.2
Oldmedilla, D.3
Seamons, K.4
Winslett, M.5
Yu, T.6
Zhang, C.7
-
27
-
-
38149056440
-
-
MAGNET Deliverable D5.0. Impact of and Requirements on Reconfigurability (June 2004)
-
MAGNET Deliverable D5.0. Impact of and Requirements on Reconfigurability (June 2004)
-
-
-
-
28
-
-
38149080457
-
Probing the Guts of Kprobes
-
Ottawa, Canada
-
Mavinakayanahalli, A., Panchamukhi, P., Keniston, J., Keshavamurthy, A., Hiramatsu, M.: Probing the Guts of Kprobes. In: Proc. Linux Symposium, Ottawa, Canada, vol. 2, pp. 101-114 (2006)
-
(2006)
Proc. Linux Symposium
, vol.2
, pp. 101-114
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
29
-
-
18244418161
-
Empowering Next-Generation Wireless Personal Communication Networks
-
Muñoz, L., Agüero, R., Choque, J., Irastorza, J., Sánchez, L., Petrova, M., Mähönen, P.: Empowering Next-Generation Wireless Personal Communication Networks. IEEE Communications Magazine 42(5), 64-70 (2004)
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 64-70
-
-
Muñoz, L.1
Agüero, R.2
Choque, J.3
Irastorza, J.4
Sánchez, L.5
Petrova, M.6
Mähönen, P.7
-
30
-
-
33845645782
-
Gaia: A Middleware Infrastructure to Enable Active Spaces
-
October-December
-
Román, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing, 74-83 (October-December 2002)
-
(2002)
IEEE Pervasive Computing
, pp. 74-83
-
-
Román, M.1
Hess, C.2
Cerqueira, R.3
Ranganathan, A.4
Campbell, R.5
Nahrstedt, K.6
-
31
-
-
38149122128
-
-
Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication using ContextAware Security Services. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, 2498, Springer, Heidelberg (2002)
-
Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication using ContextAware Security Services. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, Springer, Heidelberg (2002)
-
-
-
-
34
-
-
0037376432
-
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
-
Undercoffer, J., Perich, F., Cedilnik, A., Kagal, L., Joshi, A.: A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. ACM Mobile Networks and Applications (MONET): Special Issue on Security in Mobile Computing Environments 8(2), 113-125 (2003)
-
(2003)
ACM Mobile Networks and Applications (MONET): Special Issue on Security in Mobile Computing Environments
, vol.8
, Issue.2
, pp. 113-125
-
-
Undercoffer, J.1
Perich, F.2
Cedilnik, A.3
Kagal, L.4
Joshi, A.5
-
35
-
-
38149082099
-
-
W3C SPARQL Query Language for RDF, W3C Working Draft (October 2006)
-
W3C SPARQL Query Language for RDF, W3C Working Draft (October 2006)
-
-
-
|