Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 121 - 135 of 251.

Add to Quick Collection   All 251 Results

Sort:
 Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146763
Description: While offering many practical benefits for distributed applications, mobile agent systems pose some fundamental security challenges. In this paper, we present a new approach to mobile agent security w ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148083
Description: Binary attestation in trusted computing provides the ability to reason about the state of a platform using integrity measurements. Property based attestation, an extension of binary attestation enable ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/156735
Description: 38 page(s)
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146792
Description: Wireless sensor networks (WSN) are mobile ad hoc networks in which sensors have limited resources and communication capabilities. Secure communications in some wireless sensor networks are critical. K ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146561
Description: In these uncertain economic times, two key ingredients in short supply are trust and confidence. The concept of trust has been around for many decades (if not centuries) in different disciplines such ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/133600
Description: In this chapter we discuss Distributed Denial of Service (DDaS) auacks in network, such as the Internet, which have become significant(v prevalent over the recent years. We explain how DDoS attacks ar ... More
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148590
Description: Denial of service (DoS) attacks are one of the complex problems in the current Internet. In this paper, we propose a system, DoSTRACK, that can efficiently deal with the TCP SYN and reflection Distrib ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/323159
Description: In these uncertain economic times, two key ingredients which are in short supply are trust and confidence. The concept of trust has been around for many decades (if not for centuries) in different dis ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/127700
Description: Reputation-based trust evaluation is critical to e-commerce or e-service applications. In some applications (such as eBay), the trust management mechanisms have been introduced to provide valuable inf ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/127320
Description: Trusted computing attestation mechanism relies on hash measurements to realize remote party attestation in distributed systems. Property based attestation enables more meaningful attestation by abstra ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148609
Description: This paper studies logic based methods for representing and evaluating complex access control policies needed by modern database applications. In our framework, authorization and delegation rules are ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/119433
Description: In this paper, we present a description model of a trust network graph (TNG)-for multi-agent-based e-commerce systems, which is similar to the relationship network formed among people's transaction ac ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/119171
Description: In this paper we propose a dynamically invoked service based access control (SBAC) model to efficiently deal with the distributed denial of service (DDoS) attacks. The main idea of the SBAC is based o ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148625
Description: Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authoriz ... More
Reviewed: Reviewed